diff --git a/CVE-2022/CVE-2022-393xx/CVE-2022-39337.json b/CVE-2022/CVE-2022-393xx/CVE-2022-39337.json index 1f79c5054bf..2465bfd86a9 100644 --- a/CVE-2022/CVE-2022-393xx/CVE-2022-39337.json +++ b/CVE-2022/CVE-2022-393xx/CVE-2022-39337.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39337", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-22T15:15:07.810", - "lastModified": "2024-01-02T20:27:42.740", + "lastModified": "2024-08-28T15:44:19.793", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -84,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dromara:hertzbeat:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:apache:hertzbeat:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.2.1", - "matchCriteriaId": "F5CD6894-0209-4517-8CB3-C7BF223661DC" + "matchCriteriaId": "AC2FBA0A-B433-4E27-BB3A-2D5B2B2C33B5" } ] } diff --git a/CVE-2022/CVE-2022-399xx/CVE-2022-39997.json b/CVE-2022/CVE-2022-399xx/CVE-2022-39997.json index 4e26d5baa2a..19c172dc02b 100644 --- a/CVE-2022/CVE-2022-399xx/CVE-2022-39997.json +++ b/CVE-2022/CVE-2022-399xx/CVE-2022-39997.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39997", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-27T19:15:15.953", - "lastModified": "2024-08-28T12:57:39.090", + "lastModified": "2024-08-28T14:35:01.570", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema de requisito de contrase\u00f1a d\u00e9bil en el Router Teldats RS123, el RS123w permite a un atacante remoto escalar privilegios" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-521" + } + ] + } + ], "references": [ { "url": "https://github.com/uyhacked/Teldat-s-Router/blob/main/Teldat", diff --git a/CVE-2023/CVE-2023-263xx/CVE-2023-26322.json b/CVE-2023/CVE-2023-263xx/CVE-2023-26322.json index 0dc25b2eaa4..699d3f1607f 100644 --- a/CVE-2023/CVE-2023-263xx/CVE-2023-26322.json +++ b/CVE-2023/CVE-2023-263xx/CVE-2023-26322.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26322", "sourceIdentifier": "security@xiaomi.com", "published": "2024-08-28T08:15:06.263", - "lastModified": "2024-08-28T12:57:17.117", + "lastModified": "2024-08-28T14:35:02.847", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://trust.mi.com/misrc/bulletins/advisory?cveId=542", diff --git a/CVE-2023/CVE-2023-263xx/CVE-2023-26324.json b/CVE-2023/CVE-2023-263xx/CVE-2023-26324.json index c55c07ed3a2..561defcbbb5 100644 --- a/CVE-2023/CVE-2023-263xx/CVE-2023-26324.json +++ b/CVE-2023/CVE-2023-263xx/CVE-2023-26324.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26324", "sourceIdentifier": "security@xiaomi.com", "published": "2024-08-28T08:15:06.600", - "lastModified": "2024-08-28T12:57:17.117", + "lastModified": "2024-08-28T14:35:04.193", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://https://trust.mi.com/misrc/bulletins/advisory?cveId=544", diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42890.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42890.json index da1ff015ccb..3ca05241eab 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42890.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42890.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42890", "sourceIdentifier": "product-security@apple.com", "published": "2023-12-12T01:15:11.480", - "lastModified": "2024-06-12T10:15:26.693", + "lastModified": "2024-08-28T15:35:01.817", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46427.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46427.json index a202890bed8..e26b058a6bc 100644 --- a/CVE-2023/CVE-2023-464xx/CVE-2023-46427.json +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46427.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46427", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-09T06:15:50.740", - "lastModified": "2024-03-11T01:32:39.697", + "lastModified": "2024-08-28T14:35:05.477", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en gpac versi\u00f3n 2.3-DEV-rev588-g7edc40fee-master, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario, provocar una denegaci\u00f3n de servicio (DoS) y obtener informaci\u00f3n confidencial a trav\u00e9s de la deferencia de puntero nulo en el componente gf_dash_setup_period en media_tools/dash_client. C." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://github.com/gpac/gpac/issues/2641", diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46455.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46455.json index 546a98c1726..d5026737364 100644 --- a/CVE-2023/CVE-2023-464xx/CVE-2023-46455.json +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46455.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46455", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-12T15:15:07.743", - "lastModified": "2023-12-14T19:02:29.273", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-28T15:35:03.253", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-475xx/CVE-2023-47579.json b/CVE-2023/CVE-2023-475xx/CVE-2023-47579.json index a13e1e01d71..2788b1fe162 100644 --- a/CVE-2023/CVE-2023-475xx/CVE-2023-47579.json +++ b/CVE-2023/CVE-2023-475xx/CVE-2023-47579.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47579", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-13T02:15:07.850", - "lastModified": "2023-12-18T15:16:31.467", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-28T15:35:05.660", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49546.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49546.json index 322197a034f..bd3e7ef1cad 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49546.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49546.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49546", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T00:15:52.077", - "lastModified": "2024-03-05T13:41:01.900", + "lastModified": "2024-08-28T15:35:07.920", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Customer Support System v1 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro de correo electr\u00f3nico en /customer_support/ajax.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/geraldoalcantara/CVE-2023-49546", diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49989.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49989.json index 63fb89579c5..ef54ea4e263 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49989.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49989.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49989", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-07T01:15:52.083", - "lastModified": "2024-03-07T13:52:27.110", + "lastModified": "2024-08-28T15:35:08.730", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Hotel Booking Management v1.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro id en update.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/geraldoalcantara/CVE-2023-49989", diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51387.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51387.json index 54781b91452..bd847155e33 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51387.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51387.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51387", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-22T21:15:08.790", - "lastModified": "2024-01-03T17:43:59.510", + "lastModified": "2024-08-28T15:44:19.793", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dromara:hertzbeat:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:apache:hertzbeat:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.4.1", - "matchCriteriaId": "FA9DA6B7-E31D-4037-BB20-38E777BF59BF" + "matchCriteriaId": "0B4E8400-424B-4FCB-81C8-5D559B146130" } ] } diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51650.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51650.json index b990212e343..94deaf294d5 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51650.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51650.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51650", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-22T21:15:09.503", - "lastModified": "2024-01-03T19:53:37.357", + "lastModified": "2024-08-28T15:44:19.793", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dromara:hertzbeat:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:apache:hertzbeat:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.4.1", - "matchCriteriaId": "FA9DA6B7-E31D-4037-BB20-38E777BF59BF" + "matchCriteriaId": "0B4E8400-424B-4FCB-81C8-5D559B146130" } ] } diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0021.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0021.json index 741408e5583..b5e4fbad027 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0021.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0021.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0021", "sourceIdentifier": "security@android.com", "published": "2024-02-16T20:15:47.717", - "lastModified": "2024-02-16T21:39:50.223", + "lastModified": "2024-08-28T15:35:10.670", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En onCreate de NotificationAccessConfirmationActivity.java, existe una forma posible para que una aplicaci\u00f3n en el perfil de trabajo habilite los servicios de escucha de notificaciones debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/apps/Settings/+/53ea491d276f9a7c586c7983c08105a9bb7051f1", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0035.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0035.json index de132cca5f6..a2c65bb3be6 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0035.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0035.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0035", "sourceIdentifier": "security@android.com", "published": "2024-02-16T02:15:50.980", - "lastModified": "2024-02-16T13:37:51.433", + "lastModified": "2024-08-28T15:35:11.740", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En onNullBinding de TileLifecycleManager.java, existe una forma posible de iniciar una actividad desde segundo plano debido a que falta una verificaci\u00f3n nula. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/7b7fff1eb5014d12200a32ff9047da396c7ab6a4", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0673.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0673.json index c969ba5f3e9..13fc3e5e32c 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0673.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0673.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0673", "sourceIdentifier": "contact@wpscan.com", "published": "2024-03-28T05:15:49.820", - "lastModified": "2024-03-28T12:42:56.150", + "lastModified": "2024-08-28T15:35:12.690", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Pz-LinkCard para WordPress hasta la versi\u00f3n 2.5.1 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de cross-site scripting incluso cuando unfiltered_html no est\u00e1 permitido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/d80e725d-356a-4997-a352-33565e291fc8/", diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1670.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1670.json index 71bd3f5394e..5b44d6a5a81 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1670.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1670.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1670", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-02-21T04:15:08.210", - "lastModified": "2024-02-26T16:27:52.643", + "lastModified": "2024-08-28T15:35:13.310", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Use after free en Mojo en Google Chrome anterior a 122.0.6261.57 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html", diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1962.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1962.json index f4423738128..879f8aeacbb 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1962.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1962.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1962", "sourceIdentifier": "contact@wpscan.com", "published": "2024-03-25T05:15:50.610", - "lastModified": "2024-03-25T13:47:14.087", + "lastModified": "2024-08-28T14:35:06.573", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento CM Download Manager de WordPress anterior a 2.9.1 no tiene controles CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los administradores registrados editen las descargas a trav\u00e9s de un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/469486d4-7677-4d66-83c0-a6b9ac7c503b/", diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2174.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2174.json index 97fb2bcbb65..e85a880a930 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2174.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2174.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2174", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-03-06T19:15:09.037", - "lastModified": "2024-03-23T03:15:12.243", + "lastModified": "2024-08-28T15:35:20.553", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La implementaci\u00f3n inadecuada en V8 en Google Chrome anterior a 122.0.6261.111 permiti\u00f3 a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-358" + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop.html", diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22188.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22188.json index 531e4668bb1..ff3433f3ba5 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22188.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22188.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22188", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T02:15:27.443", - "lastModified": "2024-03-05T13:41:01.900", + "lastModified": "2024-08-28T15:35:14.437", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "TYPO3 anterior a 13.0.1 permite a un usuario administrador autenticado (con privilegios de mantenimiento del sistema) ejecutar comandos de shell arbitrarios (con los privilegios del servidor web) a trav\u00e9s de una vulnerabilidad de inyecci\u00f3n de comandos en los campos de formulario de la herramienta de instalaci\u00f3n. Las versiones fijas son 8.7.57 ELTS, 9.5.46 ELTS, 10.4.43 ELTS, 11.5.35 LTS, 12.4.11 LTS y 13.0.1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/TYPO3/typo3/security/advisories/GHSA-5w2h-59j3-8x5w", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23216.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23216.json index 67a405b69d8..1b78ef29f70 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23216.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23216.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23216", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:47.447", - "lastModified": "2024-03-13T23:15:45.953", + "lastModified": "2024-08-28T14:35:06.780", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se solucion\u00f3 un problema de manejo de rutas con una validaci\u00f3n mejorada. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5. Es posible que una aplicaci\u00f3n pueda sobrescribir archivos arbitrarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23721.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23721.json index 771354fe6a3..9a13f86e0de 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23721.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23721.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23721", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-20T20:15:07.757", - "lastModified": "2024-03-21T12:58:51.093", + "lastModified": "2024-08-28T15:35:15.520", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema de Directory Traversal en process_post en dispositivos Draytek Vigor3910 4.3.2.5. Al enviar una determinada solicitud POST, llama a la funci\u00f3n y exporta informaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://draytek.com", diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25354.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25354.json index 6b953b6bd65..8cfa1c93f9e 100644 --- a/CVE-2024/CVE-2024-253xx/CVE-2024-25354.json +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25354.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25354", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T22:15:10.093", - "lastModified": "2024-03-28T02:01:13.303", + "lastModified": "2024-08-28T14:35:07.993", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "La denegaci\u00f3n de servicio RegEx en domain-suffix 1.0.8 permite a los atacantes bloquear la aplicaci\u00f3n mediante entradas manipuladas a la funci\u00f3n de an\u00e1lisis." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://gist.github.com/6en6ar/c3b11b4058b8e2bc54717408d451fb79", diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26310.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26310.json index d0809396411..0f241406b77 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26310.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26310.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26310", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-21T20:15:46.800", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-08-28T15:35:16.490", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://archerirm.com", diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26503.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26503.json index ad3a1ea7b7d..03127dc8f91 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26503.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26503.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26503", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T22:15:22.550", - "lastModified": "2024-03-15T12:53:06.423", + "lastModified": "2024-08-28T15:35:17.227", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de carga de archivos sin restricciones en la red de universidades griegas Open eClass v.3.15 y anteriores permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo manipulado al endpoint certbadge.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://www.less-secure.com/2024/03/open-eclass-cve-2024-26503-unrestricted.html", diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2605.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2605.json index 9e236a59007..5c58f4b4d9f 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2605.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2605.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2605", "sourceIdentifier": "security@mozilla.org", "published": "2024-03-19T12:15:08.690", - "lastModified": "2024-03-19T13:26:46.000", + "lastModified": "2024-08-28T15:35:21.410", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un atacante podr\u00eda haber aprovechado el Informe de errores de Windows para ejecutar c\u00f3digo arbitrario en el sistema escapando del entorno limitado. *Nota:* Este problema solo afectaba a los sistemas operativos Windows. Otros sistemas operativos no se ven afectados. Esta vulnerabilidad afecta a Firefox < 124, Firefox ESR < 115.9 y Thunderbird < 115.9." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1872920", diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2609.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2609.json index 4c83bb14c69..50b93a8dd08 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2609.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2609.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2609", "sourceIdentifier": "security@mozilla.org", "published": "2024-03-19T12:15:08.910", - "lastModified": "2024-04-22T10:15:06.997", + "lastModified": "2024-08-28T15:35:21.617", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El retraso en la entrada del mensaje de permiso podr\u00eda haber expirado mientras la ventana no estaba enfocada, lo que hizo que el mensaje fuera vulnerable al clickjacking por parte de sitios web maliciosos. Esta vulnerabilidad afecta a Firefox < 124." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1866100", diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2615.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2615.json index b9c00656b7c..455d61cee4d 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2615.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2615.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2615", "sourceIdentifier": "security@mozilla.org", "published": "2024-03-19T12:15:09.210", - "lastModified": "2024-03-19T19:15:07.197", + "lastModified": "2024-08-28T15:35:21.843", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Errores de seguridad de la memoria presentes en Firefox 123. Algunos de estos errores mostraron evidencia de corrupci\u00f3n de la memoria y suponemos que con suficiente esfuerzo algunos de ellos podr\u00edan haberse aprovechado para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox < 124." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1881074%2C1882438%2C1881650", diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2625.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2625.json index 8d726746bc3..64fb843fe04 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2625.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2625.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2625", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-03-20T17:15:07.430", - "lastModified": "2024-04-01T15:32:17.010", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-28T15:35:22.080", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27746.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27746.json index 93a88dee062..0f9196ab257 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27746.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27746.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27746", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T22:15:47.923", - "lastModified": "2024-03-13T07:15:36.470", + "lastModified": "2024-08-28T15:35:18.103", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en Petrol Pump Mangement Software v.1.0 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado en el par\u00e1metro de direcci\u00f3n de correo electr\u00f3nico en el componente index.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27746.md", diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28339.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28339.json index 7c9b2a9d3f8..2561e378613 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28339.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28339.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28339", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-12T17:15:59.093", - "lastModified": "2024-03-12T17:46:17.273", + "lastModified": "2024-08-28T14:35:08.337", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una fuga de informaci\u00f3n en el componente debuginfo.htm de Netgear CBR40 2.5.0.28, Netgear CBK40 2.5.0.28 y Netgear CBK43 2.5.0.28 permite a los atacantes obtener informaci\u00f3n confidencial sin necesidad de autenticaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/Netgear%20CBR40%5CCBK40%5CCBK43/Info%20Leak%20in%20Netgear-CBR40%E3%80%81CBK40%E3%80%81CBK43%20Router%EF%BC%88debuginfo.htm%EF%BC%89.md", diff --git a/CVE-2024/CVE-2024-285xx/CVE-2024-28521.json b/CVE-2024/CVE-2024-285xx/CVE-2024-28521.json index 9fec4d08915..1ed4320e94f 100644 --- a/CVE-2024/CVE-2024-285xx/CVE-2024-28521.json +++ b/CVE-2024/CVE-2024-285xx/CVE-2024-28521.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28521", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T22:15:12.457", - "lastModified": "2024-03-22T12:45:36.130", + "lastModified": "2024-08-28T15:35:19.147", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en Netcome NS-ASG Application Security Gateway v.6.3.1 permite a un atacante local ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de un script manipulado para el par\u00e1metro loginid del componente /singlelogin.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/aknbg1thub/cve/blob/main/sql.md", diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28669.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28669.json index 62d0ec64209..a30435ca5b4 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28669.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28669.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28669", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T16:15:30.100", - "lastModified": "2024-03-13T18:15:58.530", + "lastModified": "2024-08-28T14:35:09.157", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que DedeCMS v5.7 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /dede/freelist_edit.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/10.md", diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28682.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28682.json index 4d98983f8d3..5f98ef43cf7 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28682.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28682.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28682", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T16:15:30.620", - "lastModified": "2024-03-13T18:15:58.530", + "lastModified": "2024-08-28T14:35:09.923", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que DedeCMS v5.7 contiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) a trav\u00e9s de /dede/sys_cache_up.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/13.md", diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28756.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28756.json index 9060c10aca0..74aa34663f8 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28756.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28756.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28756", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T21:15:10.550", - "lastModified": "2024-03-22T12:45:36.130", + "lastModified": "2024-08-28T14:35:10.690", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://www.solaredge.com/coordinated-vulnerability-disclosure-policy/advisories/sedg-2024-1", diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29131.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29131.json index b1d59e35064..da37b451f06 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29131.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29131.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29131", "sourceIdentifier": "security@apache.org", "published": "2024-03-21T09:15:07.807", - "lastModified": "2024-05-01T18:15:18.090", + "lastModified": "2024-08-28T15:35:19.953", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de escritura fuera de los l\u00edmites en la configuraci\u00f3n de Apache Commons. Este problema afecta a la configuraci\u00f3n de Apache Commons: desde 2.0 antes de 2.10.1. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.10.1, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29271.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29271.json index 2ea712af2e5..42221c03c55 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29271.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29271.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29271", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-22T04:15:11.573", - "lastModified": "2024-03-22T12:45:36.130", + "lastModified": "2024-08-28T14:35:11.473", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad reflejada de cross-site scripting (XSS) en VvvebJs anteriores a la versi\u00f3n 1.7.7, permite a atacantes remotos ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro de acci\u00f3n en save.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/givanz/VvvebJs/commit/c0c0545b44b23acc288ef907fb498ce15b9b576e", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31811.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31811.json index e72b56dcaf8..51788aade56 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31811.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31811.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31811", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-08T13:15:08.750", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-08-28T15:35:22.300", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que TOTOLINK EX200 V4.0.3c.7646_B20201211 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s del par\u00e1metro langType en la funci\u00f3n setLanguageCfg." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/TOTOLINK/EX200/CI_1_setLanguageCfg/CI.md", diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34198.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34198.json new file mode 100644 index 00000000000..fe52f81fdd7 --- /dev/null +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34198.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-34198", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-28T15:15:16.503", + "lastModified": "2024-08-28T15:46:39.613", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "TOTOLINK AC1200 Wireless Router A3002RU V2.1.1-B20230720.1011 is vulnerable to Buffer Overflow. The formWlEncrypt CGI handler in the boa program fails to limit the length of the wlan_ssid field from user input. This allows attackers to craft malicious HTTP requests by supplying an excessively long value for the wlan_ssid field, leading to a stack overflow. This can be further exploited to execute arbitrary commands or launch denial-of-service attacks." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Swind1er/02f6cb414e440c34878f20fef756e286", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35325.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35325.json index 34a5ad20b06..89a5607630d 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35325.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35325.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35325", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T17:15:50.390", - "lastModified": "2024-08-23T15:43:02.650", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-28T14:15:08.433", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -77,6 +77,10 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://github.com/idhyt/pocs/tree/main/libyaml", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35326.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35326.json index ec6580c328d..279b5f4e2d8 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35326.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35326.json @@ -2,13 +2,20 @@ "id": "CVE-2024-35326", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T17:15:50.490", - "lastModified": "2024-08-06T17:11:56.813", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-08-28T15:15:16.590", + "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", - "value": "libyaml v0.2.5 is vulnerable to Buffer Overflow. Affected by this issue is the function yaml_emitter_emit of the file /src/libyaml/src/emitter.c. The manipulation leads to a double-free." + "value": "libyaml v0.2.5 is vulnerable to Buffer Overflow. Affected by this issue is the function yaml_emitter_emit of the file /src/libyaml/src/emitter.c. The manipulation leads to a double-free. NOTE: this is disputed by the supplier because the discoverer's sample C code is incorrect: it does not call all of the required _initialize functions that are described in the LibYAML documentation." }, { "lang": "es", @@ -76,6 +83,18 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://github.com/idhyt/pocs/tree/main/libyaml", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/yaml/libyaml/issues/298", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/yaml/libyaml/issues/302", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35328.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35328.json index 4c5de2dab7d..aa03951409f 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35328.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35328.json @@ -2,13 +2,20 @@ "id": "CVE-2024-35328", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T16:15:11.037", - "lastModified": "2024-07-19T15:25:50.030", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2024-08-28T15:15:16.750", + "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", - "value": "libyaml v0.2.5 is vulnerable to DDOS. Affected by this issue is the function yaml_parser_parse of the file /src/libyaml/src/parser.c." + "value": "libyaml v0.2.5 is vulnerable to a denial of service. Affected by this issue is the function yaml_parser_parse of the file /src/libyaml/src/parser.c. NOTE: this is disputed by the supplier because the discoverer's sample C code is incorrect: it does not call required _initialize functions that are described in the LibYAML documentation." }, { "lang": "es", @@ -75,6 +82,10 @@ "tags": [ "Exploit" ] + }, + { + "url": "https://github.com/idhyt/pocs/tree/main/libyaml", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44083.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44083.json index e3441114830..ab692e490e0 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44083.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44083.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44083", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-19T04:15:04.760", - "lastModified": "2024-08-21T12:35:54.380", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-28T15:15:17.050", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -100,6 +100,10 @@ } ], "references": [ + { + "url": "https://github.com/Azvanzed/CVE-2024-44083/", + "source": "cve@mitre.org" + }, { "url": "https://github.com/Azvanzed/IdaMeme", "source": "cve@mitre.org", diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45346.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45346.json index 2cc12fc7f7e..93e848fa49f 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45346.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45346.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45346", "sourceIdentifier": "security@xiaomi.com", "published": "2024-08-28T07:15:08.823", - "lastModified": "2024-08-28T12:57:17.117", + "lastModified": "2024-08-28T14:35:12.640", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://trust.mi.com/misrc/bulletins/advisory?cveId=545", diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6879.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6879.json index 080d252c830..eba36467e73 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6879.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6879.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6879", "sourceIdentifier": "contact@wpscan.com", "published": "2024-08-26T06:15:04.867", - "lastModified": "2024-08-26T12:47:20.187", + "lastModified": "2024-08-28T15:35:24.120", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El complemento Quiz and Survey Master (QSM) de WordPress anterior a 9.1.1 no valida ni escapa ciertos campos del cuestionario antes de mostrarlos en una p\u00e1gina o publicaci\u00f3n donde est\u00e1 integrado el cuestionario, lo que podr\u00eda permitir que los roles de colaborador y superiores realicen ataques de Cross-Site Scripting Almacenado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/4da0b318-03e7-409d-9b02-f108e4232c87/", diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7720.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7720.json index a54a7d43d81..5d354070f00 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7720.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7720.json @@ -2,16 +2,55 @@ "id": "CVE-2024-7720", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2024-08-27T18:15:15.840", - "lastModified": "2024-08-27T18:33:14.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-28T14:35:14.160", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HP Security Manager is potentially vulnerable to Remote Code Execution as a result of code vulnerability within the product's solution open-source libraries." + }, + { + "lang": "es", + "value": "HP Security Manager es potencialmente vulnerable a la ejecuci\u00f3n remota de c\u00f3digo como resultado de la vulnerabilidad del c\u00f3digo dentro de las librer\u00edas de c\u00f3digo abierto de la soluci\u00f3n del producto." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.hp.com/us-en/document/ish_11074404-11074432-16/", diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8088.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8088.json index d515e882734..ff130c884d5 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8088.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8088.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8088", "sourceIdentifier": "cna@python.org", "published": "2024-08-22T19:15:09.720", - "lastModified": "2024-08-26T19:15:08.433", + "lastModified": "2024-08-28T14:15:08.813", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,28 +59,6 @@ "baseSeverity": "HIGH" } } - ], - "cvssMetricV31": [ - { - "source": "cna@python.org", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 7.5, - "baseSeverity": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 - } ] }, "weaknesses": [ @@ -116,6 +94,10 @@ "url": "https://github.com/python/cpython/issues/122905", "source": "cna@python.org" }, + { + "url": "https://github.com/python/cpython/issues/123270", + "source": "cna@python.org" + }, { "url": "https://github.com/python/cpython/pull/122906", "source": "cna@python.org" diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8195.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8195.json new file mode 100644 index 00000000000..55034e5a8db --- /dev/null +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8195.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-8195", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-28T14:15:08.990", + "lastModified": "2024-08-28T14:31:24.487", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Permalink Manager Lite plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'debug_data', 'debug_query', and 'debug_redirect' functions in all versions up to, and including, 2.4.4. This makes it possible for unauthenticated attackers to extract sensitive data including password, title, and content of password-protected posts." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/permalink-manager/tags/2.4.4/includes/core/permalink-manager-debug.php#L70", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3142479/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aadf1d59-60ba-4da2-adbb-4e84d587a34d?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 3c1438914c4..c4db870f9c0 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-28T14:00:18.251726+00:00 +2024-08-28T16:00:18.024756+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-28T13:49:50.457000+00:00 +2024-08-28T15:46:39.613000+00:00 ``` ### Last Data Feed Release @@ -33,47 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -261369 +261371 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `2` -- [CVE-2024-6449](CVE-2024/CVE-2024-64xx/CVE-2024-6449.json) (`2024-08-28T12:15:06.340`) -- [CVE-2024-6450](CVE-2024/CVE-2024-64xx/CVE-2024-6450.json) (`2024-08-28T12:15:06.507`) -- [CVE-2024-7447](CVE-2024/CVE-2024-74xx/CVE-2024-7447.json) (`2024-08-28T12:15:06.620`) +- [CVE-2024-34198](CVE-2024/CVE-2024-341xx/CVE-2024-34198.json) (`2024-08-28T15:15:16.503`) +- [CVE-2024-8195](CVE-2024/CVE-2024-81xx/CVE-2024-8195.json) (`2024-08-28T14:15:08.990`) ### CVEs modified in the last Commit -Recently modified CVEs: `58` +Recently modified CVEs: `45` -- [CVE-2024-7269](CVE-2024/CVE-2024-72xx/CVE-2024-7269.json) (`2024-08-28T12:57:17.117`) -- [CVE-2024-7573](CVE-2024/CVE-2024-75xx/CVE-2024-7573.json) (`2024-08-28T12:57:27.610`) -- [CVE-2024-7608](CVE-2024/CVE-2024-76xx/CVE-2024-7608.json) (`2024-08-28T12:15:06.900`) -- [CVE-2024-8030](CVE-2024/CVE-2024-80xx/CVE-2024-8030.json) (`2024-08-28T12:57:27.610`) -- [CVE-2024-8210](CVE-2024/CVE-2024-82xx/CVE-2024-8210.json) (`2024-08-28T12:57:39.090`) -- [CVE-2024-8211](CVE-2024/CVE-2024-82xx/CVE-2024-8211.json) (`2024-08-28T12:57:39.090`) -- [CVE-2024-8212](CVE-2024/CVE-2024-82xx/CVE-2024-8212.json) (`2024-08-28T12:57:39.090`) -- [CVE-2024-8213](CVE-2024/CVE-2024-82xx/CVE-2024-8213.json) (`2024-08-28T12:57:39.090`) -- [CVE-2024-8214](CVE-2024/CVE-2024-82xx/CVE-2024-8214.json) (`2024-08-28T12:57:39.090`) -- [CVE-2024-8216](CVE-2024/CVE-2024-82xx/CVE-2024-8216.json) (`2024-08-28T12:57:39.090`) -- [CVE-2024-8217](CVE-2024/CVE-2024-82xx/CVE-2024-8217.json) (`2024-08-28T12:57:39.090`) -- [CVE-2024-8218](CVE-2024/CVE-2024-82xx/CVE-2024-8218.json) (`2024-08-28T12:57:39.090`) -- [CVE-2024-8219](CVE-2024/CVE-2024-82xx/CVE-2024-8219.json) (`2024-08-28T12:57:39.090`) -- [CVE-2024-8220](CVE-2024/CVE-2024-82xx/CVE-2024-8220.json) (`2024-08-28T12:57:39.090`) -- [CVE-2024-8221](CVE-2024/CVE-2024-82xx/CVE-2024-8221.json) (`2024-08-28T12:57:27.610`) -- [CVE-2024-8222](CVE-2024/CVE-2024-82xx/CVE-2024-8222.json) (`2024-08-28T12:57:27.610`) -- [CVE-2024-8223](CVE-2024/CVE-2024-82xx/CVE-2024-8223.json) (`2024-08-28T12:57:27.610`) -- [CVE-2024-8224](CVE-2024/CVE-2024-82xx/CVE-2024-8224.json) (`2024-08-28T12:57:27.610`) -- [CVE-2024-8225](CVE-2024/CVE-2024-82xx/CVE-2024-8225.json) (`2024-08-28T12:57:27.610`) -- [CVE-2024-8226](CVE-2024/CVE-2024-82xx/CVE-2024-8226.json) (`2024-08-28T12:57:27.610`) -- [CVE-2024-8227](CVE-2024/CVE-2024-82xx/CVE-2024-8227.json) (`2024-08-28T12:57:27.610`) -- [CVE-2024-8228](CVE-2024/CVE-2024-82xx/CVE-2024-8228.json) (`2024-08-28T12:57:27.610`) -- [CVE-2024-8229](CVE-2024/CVE-2024-82xx/CVE-2024-8229.json) (`2024-08-28T12:57:27.610`) -- [CVE-2024-8230](CVE-2024/CVE-2024-82xx/CVE-2024-8230.json) (`2024-08-28T12:57:27.610`) -- [CVE-2024-8231](CVE-2024/CVE-2024-82xx/CVE-2024-8231.json) (`2024-08-28T12:57:27.610`) +- [CVE-2024-23721](CVE-2024/CVE-2024-237xx/CVE-2024-23721.json) (`2024-08-28T15:35:15.520`) +- [CVE-2024-25354](CVE-2024/CVE-2024-253xx/CVE-2024-25354.json) (`2024-08-28T14:35:07.993`) +- [CVE-2024-2605](CVE-2024/CVE-2024-26xx/CVE-2024-2605.json) (`2024-08-28T15:35:21.410`) +- [CVE-2024-2609](CVE-2024/CVE-2024-26xx/CVE-2024-2609.json) (`2024-08-28T15:35:21.617`) +- [CVE-2024-2615](CVE-2024/CVE-2024-26xx/CVE-2024-2615.json) (`2024-08-28T15:35:21.843`) +- [CVE-2024-2625](CVE-2024/CVE-2024-26xx/CVE-2024-2625.json) (`2024-08-28T15:35:22.080`) +- [CVE-2024-26310](CVE-2024/CVE-2024-263xx/CVE-2024-26310.json) (`2024-08-28T15:35:16.490`) +- [CVE-2024-26503](CVE-2024/CVE-2024-265xx/CVE-2024-26503.json) (`2024-08-28T15:35:17.227`) +- [CVE-2024-27746](CVE-2024/CVE-2024-277xx/CVE-2024-27746.json) (`2024-08-28T15:35:18.103`) +- [CVE-2024-28339](CVE-2024/CVE-2024-283xx/CVE-2024-28339.json) (`2024-08-28T14:35:08.337`) +- [CVE-2024-28521](CVE-2024/CVE-2024-285xx/CVE-2024-28521.json) (`2024-08-28T15:35:19.147`) +- [CVE-2024-28669](CVE-2024/CVE-2024-286xx/CVE-2024-28669.json) (`2024-08-28T14:35:09.157`) +- [CVE-2024-28682](CVE-2024/CVE-2024-286xx/CVE-2024-28682.json) (`2024-08-28T14:35:09.923`) +- [CVE-2024-28756](CVE-2024/CVE-2024-287xx/CVE-2024-28756.json) (`2024-08-28T14:35:10.690`) +- [CVE-2024-29131](CVE-2024/CVE-2024-291xx/CVE-2024-29131.json) (`2024-08-28T15:35:19.953`) +- [CVE-2024-29271](CVE-2024/CVE-2024-292xx/CVE-2024-29271.json) (`2024-08-28T14:35:11.473`) +- [CVE-2024-31811](CVE-2024/CVE-2024-318xx/CVE-2024-31811.json) (`2024-08-28T15:35:22.300`) +- [CVE-2024-35325](CVE-2024/CVE-2024-353xx/CVE-2024-35325.json) (`2024-08-28T14:15:08.433`) +- [CVE-2024-35326](CVE-2024/CVE-2024-353xx/CVE-2024-35326.json) (`2024-08-28T15:15:16.590`) +- [CVE-2024-35328](CVE-2024/CVE-2024-353xx/CVE-2024-35328.json) (`2024-08-28T15:15:16.750`) +- [CVE-2024-44083](CVE-2024/CVE-2024-440xx/CVE-2024-44083.json) (`2024-08-28T15:15:17.050`) +- [CVE-2024-45346](CVE-2024/CVE-2024-453xx/CVE-2024-45346.json) (`2024-08-28T14:35:12.640`) +- [CVE-2024-6879](CVE-2024/CVE-2024-68xx/CVE-2024-6879.json) (`2024-08-28T15:35:24.120`) +- [CVE-2024-7720](CVE-2024/CVE-2024-77xx/CVE-2024-7720.json) (`2024-08-28T14:35:14.160`) +- [CVE-2024-8088](CVE-2024/CVE-2024-80xx/CVE-2024-8088.json) (`2024-08-28T14:15:08.813`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 0afdd6dc9d2..f4846aaa441 100644 --- a/_state.csv +++ b/_state.csv @@ -168726,7 +168726,7 @@ CVE-2021-22505,0,0,675e854cabcaeacf3b78a58593a856837df3f64f635c2f4dd4c947fa88d2f CVE-2021-22506,0,0,7377ec998ae060ed34b511d8dd7b1645447b5531a985bd6c0ecd5db299ab8c1d,2024-07-26T20:01:47.710000 CVE-2021-22507,0,0,49a8df4354221c1d979c5377b3f9b1248fa19b8c379d04eb8b6a4dc3660b49f5,2023-11-07T03:30:15.790000 CVE-2021-22508,0,0,67652588d6598b9dba62407096c17326f8c4c524d1709ce1b654eeddc41e3e93,2024-05-20T13:00:24.667000 -CVE-2021-22509,0,1,ad133852cb46349aa71f20aa683388c907a4b5433e4facfdc276ef8ad2143488,2024-08-28T12:57:27.610000 +CVE-2021-22509,0,0,ad133852cb46349aa71f20aa683388c907a4b5433e4facfdc276ef8ad2143488,2024-08-28T12:57:27.610000 CVE-2021-2251,0,0,4286961cf0137de4568c5f4c5b69bb31850c9f2bab612da4f72c39c76dba0177,2021-04-29T12:58:39.193000 CVE-2021-22510,0,0,dcc596e7382beb136aa69c33e161a613333c65851d59175ffc16ad5915f58f7e,2023-11-07T03:30:16.050000 CVE-2021-22511,0,0,f41f49f6ec16503a60944cca593f738d35701c43b2681c82c497e647c5c624c7,2023-11-07T03:30:16.310000 @@ -168746,9 +168746,9 @@ CVE-2021-22525,0,0,296450ca1e1233adcf3143ac5bdea72d2264725eafb87a4c07a15b7b7e801 CVE-2021-22526,0,0,e31e530327ad3bebc011bfe3d7d9a24dcf8f77efdd622cf1af58a96cf7283010,2023-11-07T03:30:19.707000 CVE-2021-22527,0,0,bc0c2ffc8677e4ec8b64c8e43d2a38fc47ca1cbe2713f899b24a62400ab1a12f,2023-11-07T03:30:19.927000 CVE-2021-22528,0,0,5bf59e7d54e0ee9528364054296e2d9a2de193e1d8cb55d017d3177f24ebff26,2023-11-07T03:30:20.143000 -CVE-2021-22529,0,1,795293a14b7e4e5bc81ca423ce3843d8f39e704497a7846df7f14de3446c552b,2024-08-28T12:57:27.610000 +CVE-2021-22529,0,0,795293a14b7e4e5bc81ca423ce3843d8f39e704497a7846df7f14de3446c552b,2024-08-28T12:57:27.610000 CVE-2021-2253,0,0,9e2be9bb813a2e3899ee4a36c9db4012f6aae0eed717889a70a4a84f203004b0,2021-04-29T12:57:58.230000 -CVE-2021-22530,0,1,296ff93efb349c5cc189cd25eb3faa01ca7bd606a4fb82f02dba4baa92e298c5,2024-08-28T12:57:17.117000 +CVE-2021-22530,0,0,296ff93efb349c5cc189cd25eb3faa01ca7bd606a4fb82f02dba4baa92e298c5,2024-08-28T12:57:17.117000 CVE-2021-22531,0,0,2ffef1a3095a1f67c14a48602d93f0c886d38c01b7653274771e69e8e9e12dcb,2023-11-07T03:30:20.380000 CVE-2021-22535,0,0,0cff80698ce8ede7035f297b2f9817048e9d9e9718e7dc9eb83b3305cbb47e07,2023-11-07T03:30:20.670000 CVE-2021-22538,0,0,447322567d97db99dd06b56b17c4818a654489f5f18b93925c9e7c6e4f0028d2,2021-04-06T14:11:52.257000 @@ -180318,9 +180318,9 @@ CVE-2021-38113,0,0,a1fa7ef31580e0e2fae651fffb9fa372b4cee32d23a47ce868d9acaf00240 CVE-2021-38114,0,0,f5bbfabbe38c5644e8cd21108a48b05b9d6c1f858bde8c7bb7493de97f4f5d70,2023-11-07T03:37:13.900000 CVE-2021-38115,0,0,0d4529d2dc20d029bb9ee8663c7b78d5bfa9be575f5879ed777d4526582a3d07,2024-04-07T01:17:53.337000 CVE-2021-3812,0,0,afacf08a6926dd761cd14ea7be38b0c773f7d4e31838aabc34b4a238033af577,2021-09-28T02:32:32.737000 -CVE-2021-38120,0,1,9e0da8f92f314a0f46e25c5d5abc0657c16193f190ab93a39627ccfc2029a5ea,2024-08-28T12:57:17.117000 -CVE-2021-38121,0,1,bef884f6c9e4ad1a9dd809e12d060109f9a9d327fcedafe4cc8ff261ac74e581,2024-08-28T12:57:17.117000 -CVE-2021-38122,0,1,431d16ddfe291f564f2d686a99c4cb8528cfee693e29d31339284e0c684bbcd8,2024-08-28T12:57:17.117000 +CVE-2021-38120,0,0,9e0da8f92f314a0f46e25c5d5abc0657c16193f190ab93a39627ccfc2029a5ea,2024-08-28T12:57:17.117000 +CVE-2021-38121,0,0,bef884f6c9e4ad1a9dd809e12d060109f9a9d327fcedafe4cc8ff261ac74e581,2024-08-28T12:57:17.117000 +CVE-2021-38122,0,0,431d16ddfe291f564f2d686a99c4cb8528cfee693e29d31339284e0c684bbcd8,2024-08-28T12:57:17.117000 CVE-2021-38123,0,0,733f1d31597cbc536fab4d2ae9084a85932eb1447339cd96f79697cf7ce2cf3d,2023-11-07T03:37:14.523000 CVE-2021-38124,0,0,f2fcd4839f48ca621d12d11b2f6b8169a58cfe9389901fc30c449c923b2bbef3,2023-11-07T03:37:15.587000 CVE-2021-38125,0,0,cca5fea4853ef2eaacee614aaf6f07a8d197ea57c437239ce440cbbd8a6e3f17,2023-11-07T03:37:16.490000 @@ -205546,7 +205546,7 @@ CVE-2022-39332,0,0,477ba7648b2ff3efc7e15c35cd4f9a8063953643bd104d8fcf6e4123d4bd6 CVE-2022-39333,0,0,cae9628f620aeaa785bde614c3495c0a2350667e343b17114cdc498043380647,2022-12-01T17:39:03.577000 CVE-2022-39334,0,0,953bd45d6f15391408c3de4c9a67e9cc53b41429382ade33f7af626f41ee3551,2023-03-06T23:15:10.630000 CVE-2022-39335,0,0,338f7cecc4b22c17265bfd6917b9af12b92d4fcf78cd780c23b38825977fd2cc,2023-06-11T04:15:46.950000 -CVE-2022-39337,0,0,a3aebe223297275c1af6833d03d582ca37257d2081944851e67bff8fda414b06,2024-01-02T20:27:42.740000 +CVE-2022-39337,0,1,f866441bba89a0453feac8e7bea56e5219ca451051c24133b8806696129bfcb4,2024-08-28T15:44:19.793000 CVE-2022-39338,0,0,df2a8a3e9084a1d1b2316940bbb923180459197a0b5b11dac656c6305cfdf18b,2022-12-01T20:43:10.727000 CVE-2022-39339,0,0,e54c18e4443dc47f306cd260e8ea3e02e1e318519ab443dbbf61c42136e20110,2022-12-01T20:43:02.263000 CVE-2022-3934,0,0,7ed77fa0bccfc3f3da1a7580185e2d2d09a7b3cc8b2502be4a6a5fc2baf3cbd9,2023-11-07T03:51:59.160000 @@ -205864,7 +205864,7 @@ CVE-2022-39988,0,0,9f069419049172b539dd2423b25d3d05c1cc2c011ba2c6a9dcec6c5b14ff3 CVE-2022-39989,0,0,7ffdce84d8cd26b98c707b03c57c173dd5d7b41678d150601e81ecbc1bbf6f23,2023-05-04T19:49:24.510000 CVE-2022-3999,0,0,56326c6b077d7a3c7ca90954778c1f40832d60973c4c7842e4f24fc67bbe6eef,2023-11-07T03:52:05.753000 CVE-2022-39996,0,0,515d89341d75fc891c2495715479db343fbd6a795549afa8dc6e58128081b767,2024-08-27T21:35:01.140000 -CVE-2022-39997,0,1,cd7a61c846c22c80c0544292da520e989793b0b1614784062f16417855a4b438,2024-08-28T12:57:39.090000 +CVE-2022-39997,0,1,c4be36e10992cb34e24c9e36e48466b46176d35b275196043e4e9383a4fda946,2024-08-28T14:35:01.570000 CVE-2022-4000,0,0,293c79822977efd995079bd9f91c2bb859b092b412fd024b23d45cadf6837091,2023-11-07T03:56:39.273000 CVE-2022-40000,0,0,b2c90b4cd331ea48eb1c696df1cfed736f89b655e360d832a043e7696dd829cb,2022-12-19T16:23:40.887000 CVE-2022-40001,0,0,53944e40d3dc029fd806c75d13f9eb446512b7b5067631d8fcb6e9c0e4408b76,2022-12-19T16:23:53.913000 @@ -219700,10 +219700,10 @@ CVE-2023-26318,0,0,d49830620df46f2dde3da449a5ab4d59351f38e41e437bccf559cb5c96c8a CVE-2023-26319,0,0,3dd6441fbb2cf89b0e957e6f3f556dd38ea034f50ae932ae756d43f14248f8cd,2023-10-16T19:02:59.867000 CVE-2023-2632,0,0,301898869b5a60457376f20e3b7ea036dcafa847ec705a351ca3cee971a25c85,2023-05-25T16:08:28.660000 CVE-2023-26320,0,0,ce18ada0dab81b6e3cbb23f236fe2120ff674b38177ae9eb5db23adbd1986f1c,2023-10-16T19:04:10.920000 -CVE-2023-26321,0,1,b75b605fdb8ac99bba7cd33bc5a27b0464761915d8e051cc7391f87c31191bc9,2024-08-28T12:57:17.117000 -CVE-2023-26322,0,1,c40687e83d74876910fb67eff7f943bef85560838a3fb0038e2b513dc8229d59,2024-08-28T12:57:17.117000 -CVE-2023-26323,0,1,484add0c04d4a78cede6c93a8c8952694f596119aecb48ac15eaa55dd3b75254,2024-08-28T12:57:17.117000 -CVE-2023-26324,0,1,b3796eff8bd943892bb45362a86e1a399396db5b76aa729e03c56cef912d6aa0,2024-08-28T12:57:17.117000 +CVE-2023-26321,0,0,b75b605fdb8ac99bba7cd33bc5a27b0464761915d8e051cc7391f87c31191bc9,2024-08-28T12:57:17.117000 +CVE-2023-26322,0,1,ae8c5667c11735312321cb181d2196f18f33751c8d17700350b90e39fb0c2fbd,2024-08-28T14:35:02.847000 +CVE-2023-26323,0,0,484add0c04d4a78cede6c93a8c8952694f596119aecb48ac15eaa55dd3b75254,2024-08-28T12:57:17.117000 +CVE-2023-26324,0,1,8b1c94ee76ce1b7d9628f12727c64bd99e209245cf657c110e5b9f5e4629b4f9,2024-08-28T14:35:04.193000 CVE-2023-26325,0,0,0815d0f5538437b0c1a37e2d30e66d4594a1f33bad8ba20cf36ef6d2f6c24077,2023-04-13T20:15:09.657000 CVE-2023-26326,0,0,7a94421fc97dc2e69220f52c8149f79ba5e3f607156d057693f823cb0ba1ecd2,2023-03-03T16:46:29.717000 CVE-2023-26327,0,0,1cc55ebadf8900607cbb779734840e485cf992ab645ea88d7f35d67b7049a018,2023-04-03T18:42:37.320000 @@ -232351,7 +232351,7 @@ CVE-2023-42887,0,0,6a183a6bbbb784cf3ff7a27ca6dc2d91b7b7c3f3cb1bda7867c2939a5f618 CVE-2023-42888,0,0,b067218531e45be7cc34fa1275d3c2b57f0925c26eb93740839a000d9953633b,2024-01-26T20:53:27.637000 CVE-2023-42889,0,0,1649dc73df9490d9ce669184ee1d4b8722c3b17f66d00680b3c3c34df498b755,2024-02-22T19:07:27.197000 CVE-2023-4289,0,0,97e9dbfb002f991c9b0c7bb56513ad2ad7a34e2cc2f1908f40b15808fc4c7b13,2023-11-07T04:22:25.410000 -CVE-2023-42890,0,0,5b8aebb147e55c36aa77d8987a88db8f5e314c8eb5e78fd8ff6fd1567e1228f8,2024-06-12T10:15:26.693000 +CVE-2023-42890,0,1,53f9bd40d8d0f96f9f6543dcc5925d3ff1f33138300a4d36e7353088fc83c101,2024-08-28T15:35:01.817000 CVE-2023-42891,0,0,9e832a9c79650ad0321f807def388413064ff2ab68c6ecbf9bb18e2496c75004,2023-12-13T17:46:10.560000 CVE-2023-42892,0,0,45868be9e713d43fbe1857fd521e7819eff03e6332a2f62faa55e58f6a79244c,2024-08-21T23:35:00.660000 CVE-2023-42893,0,0,3980591866774d66d6fd5796746be691a489cc5b2a82a91788fc3f19d39afc21,2024-08-27T17:35:02.800000 @@ -232465,7 +232465,7 @@ CVE-2023-43072,0,0,219c44680bf759277ea4c69a6bf018846271d7e56f74b36a7fad93b31f540 CVE-2023-43073,0,0,e697c40808ab95fd13c420bd1b78ac70ad6637796f3acc71be4ec7f8b68cb76e,2023-10-06T17:55:26.480000 CVE-2023-43074,0,0,423707a42672f5259f9309c79a9cfc4fe6b155cc57a03b905f2e7fed655682fb,2023-10-28T03:29:38.597000 CVE-2023-43076,0,0,ae235c36f6c55b4555a6ebe6fbeb61abe2e5ed01d2903954b4d265b61046d0d8,2023-11-09T19:05:13.340000 -CVE-2023-43078,0,1,daf9621b58fd71b130b0c08bf454e60417405b8712014360841c03ecab22ad1d,2024-08-28T12:57:27.610000 +CVE-2023-43078,0,0,daf9621b58fd71b130b0c08bf454e60417405b8712014360841c03ecab22ad1d,2024-08-28T12:57:27.610000 CVE-2023-43079,0,0,045ae66c129d3b00c4efd0ea04f5ab8b9542c8092e4b729f681d90aeef4463ea,2023-10-20T20:01:50.240000 CVE-2023-4308,0,0,2e985217aefe9f54ecaa61ae64a06b347427536f2232a7aed87da4691ebf08e5,2023-11-07T04:22:26.690000 CVE-2023-43081,0,0,f8079c158546141cf0052ea6928190a507a7635d846c884a2289865895045133,2023-11-27T22:08:21.640000 @@ -234278,7 +234278,7 @@ CVE-2023-4589,0,0,5823a1bbdcd3fd3dad6a9d361ad6771c5169f34ce23ef9e39b305d1aaf66a9 CVE-2023-45892,0,0,31ea99a81b63e5dc5404654e4231556ec48f5c4f723835f37c58ea694f43c518,2024-01-08T19:31:03.043000 CVE-2023-45893,0,0,012ce31fe6e07df7e806e0f22cab292b188d57d4fcd77a1edd037ec55ea25c2a,2024-01-08T19:30:51.917000 CVE-2023-45894,0,0,acbbd0369c677d90271e9d43ae921ffda1b227f19a0c24cf767e01f00c88765f,2023-12-20T16:44:29.960000 -CVE-2023-45896,0,1,b6f1871c5cde20100e5e34025c9d349c486d49aa1d3960ac236671572654f902,2024-08-28T12:57:27.610000 +CVE-2023-45896,0,0,b6f1871c5cde20100e5e34025c9d349c486d49aa1d3960ac236671572654f902,2024-08-28T12:57:27.610000 CVE-2023-45897,0,0,734daadcbcf83a77d0375bea2b59862190723c5d109c64b97c90f46f832ac6a4,2023-11-21T16:33:02.183000 CVE-2023-45898,0,0,f3261a8736c0c34cdaa65c9211bd18854b9e3c8fbb8c9c8e0fd98bdbf7fab3eb,2024-08-26T16:07:21.753000 CVE-2023-45899,0,0,8ea5b9ddd2874024b78e9d2dcda12439e81d1dbfe77d0f8413dab38e7cc66b6f,2023-11-08T16:54:12.307000 @@ -234678,7 +234678,7 @@ CVE-2023-46422,0,0,9828db1651145e55303f7c90e9b80d9152a0babe8f2b6bf7c6211e8345b27 CVE-2023-46423,0,0,fae9f7621f04eecce4ee8c67ae3cb477991a1d96e9608dd2d417468ee933e47e,2023-11-01T16:37:41.027000 CVE-2023-46424,0,0,50d5b8cffd7312c685b7f6280f3573716a877c1580c703fe9f896ec5081cf2ad,2023-11-01T16:37:51.027000 CVE-2023-46426,0,0,095958b9525a539d6bad1510a5c4a9bb3f3e81ffc03067e72a3a22c99ed7e1b9,2024-08-05T20:35:01.333000 -CVE-2023-46427,0,0,f866f9e54a1652715d6c8d5cf0ab85e5d06c714508a8f7e5c787c0848377ee83,2024-03-11T01:32:39.697000 +CVE-2023-46427,0,1,49f28026f66bab442fbbca6291281014daccaf89a172c4da56b52f3f0d507191,2024-08-28T14:35:05.477000 CVE-2023-46428,0,0,faa78dcade98f2a1e124d91c90afd9b9a200a5dd262391aece6b2b8f2e67c134,2023-11-06T19:30:17.810000 CVE-2023-4643,0,0,f6caf5740564746f31d2fc7731a7738c5a9fdb65fac1d028210c31eb8a3076a3,2023-11-07T04:22:48.657000 CVE-2023-46435,0,0,9045d4cee8109ec2b6ac83ee0b4dc133557afb03e66020489ecea163a3631054,2023-10-30T16:20:21.103000 @@ -234692,7 +234692,7 @@ CVE-2023-4645,0,0,080630aaab2615758e1b4d6f50d89291c19a67c7887d417a836246d5119706 CVE-2023-46450,0,0,9eedfca9fc0f26e4373fe52fcdff22340a7718bcd00536967f1e45fb1ec952e0,2023-10-30T15:55:16.417000 CVE-2023-46451,0,0,b7c650f5171568ff66e636d2cc25afe576e379cc753300c14a6647b49ae59d53,2023-11-06T18:15:09.143000 CVE-2023-46454,0,0,3dbd1be3466e652b6244f86c6f23f5226b664c9ce63ddb43f7325d4e0e6c7c6d,2023-12-14T19:33:14.070000 -CVE-2023-46455,0,0,a859f024e4b06f4e423087dfbad3be2cb30963db3300ad4a56b0de367d3de252,2023-12-14T19:02:29.273000 +CVE-2023-46455,0,1,e03b9e4bc6b2de6f664a9f7cd364bb185c8fa2f5c4a439688d4c28bff35710b3,2024-08-28T15:35:03.253000 CVE-2023-46456,0,0,c4dfd3d82ae14a8b837bb61f8d23f14c4d0fc689e9b777f969e34fde85a437e8,2023-12-14T22:49:19.163000 CVE-2023-4646,0,0,8b7e316f7875d1dd1b48005b399d9b0cf2d7921bd690ed55ff013ac594bec756,2023-11-07T04:22:48.910000 CVE-2023-46467,0,0,8054488fd0132f7e27914107b3db54b56d981952490fdc3e16c9ef4f66fb3574,2023-11-07T15:08:59.640000 @@ -235490,7 +235490,7 @@ CVE-2023-47575,0,0,30cf6be65abd61448a4a89a9b72de85e929953eb93306b378cfacaff6d87c CVE-2023-47576,0,0,b658502efe54d9b05c4f426be235a8b40d293e00fdab9f01c40b60b57e7ef3f8,2023-12-18T15:01:53.273000 CVE-2023-47577,0,0,c0f13ddb15e49455530054095cc0266851552b5d13fc042a223643cd9df0b789,2023-12-18T15:08:42.737000 CVE-2023-47578,0,0,8bf0aae804a5d895a13b8eaa8706ff025054dd6e316ca1b2834837b692a8f7bf,2023-12-18T15:09:42.753000 -CVE-2023-47579,0,0,888d69db0bf618a49c5c69ac2b9aa678737c63b148d13228010d5d518e0f79ec,2023-12-18T15:16:31.467000 +CVE-2023-47579,0,1,0bc8ca0bdf2b7d7cbafb94bed8df43d5e20d7b33eda5789e01e7640552057e07,2024-08-28T15:35:05.660000 CVE-2023-4758,0,0,713db879644d26febfa528fa3b5a32eaa4d032e64a180d47e3477adfad42aa0a,2023-09-06T20:43:43.440000 CVE-2023-47580,0,0,1046d1b7ec521db48bb6fc1bed5767243c03c220591fb511a40a277d8666b4e6,2024-08-14T19:35:12.147000 CVE-2023-47581,0,0,5103c8a44f66e69718053305c6d841267ec2f6ba489578cb95ee5adf75321cf4,2024-08-12T15:35:03.167000 @@ -236917,7 +236917,7 @@ CVE-2023-49540,0,0,fc00996658e2e1a07b2142617d49b74a28a84c9993046a375e13324fccec2 CVE-2023-49543,0,0,9b27cf28e2f4c20b40d2a61fced0fc62af90f21931996c253e884b5f19a62074,2024-03-01T22:22:25.913000 CVE-2023-49544,0,0,4165df005ca812878112fcb221906d65322102731e6bd43d48afbe4e5ae39573,2024-08-01T13:45:11.667000 CVE-2023-49545,0,0,5c8aa915328bef2165801ea42c2341178b1be4c886fc54a48ff456640387987f,2024-08-26T20:35:08.767000 -CVE-2023-49546,0,0,42c4c73e286dbbc54bb4d1edee710426f74da9660183ef38c8db0ddb322c4c0d,2024-03-05T13:41:01.900000 +CVE-2023-49546,0,1,651265cc1835f191987d8dea805e802734a1a950ddf6c3305c2a4b545571de95,2024-08-28T15:35:07.920000 CVE-2023-49547,0,0,0d72f4b66aa616990dce257fb750379ef931b2acf59d9d176a6ef0cb0371efa7,2024-03-05T13:41:01.900000 CVE-2023-49548,0,0,34b77376d27ee723d3ac14898631fa76b657dfe4cf5b3276c3299d37e41dd1fc,2024-08-08T20:35:02.323000 CVE-2023-49549,0,0,2421b127f456be0fc67abfad0a3b1f8926786d5d65fc8c1f3d22621b1f55fe3e,2024-01-09T16:18:48.520000 @@ -237237,7 +237237,7 @@ CVE-2023-49985,0,0,48621d95c58dd65f642543dd394ac7e9d6daa5b1663d066d6d97b86f6ff66 CVE-2023-49986,0,0,0bfa07ebd9dbe1f0457cbd00aed62c65d63f7c4a056604f06d8368c48ba916b7,2024-08-05T16:35:03.407000 CVE-2023-49987,0,0,6666894146cb92f75fc70a6c668cf409191be8d05d66fdbc2b6973b27220807d,2024-03-07T13:52:27.110000 CVE-2023-49988,0,0,af3f01af8abbd20907ca3d22a8fb2f0ce6ca13f1af6f9bf92429d44550b8b49a,2024-08-16T18:35:02.507000 -CVE-2023-49989,0,0,cd803225e66f0d3646de2b55d01b499d1849cb99a420f63e4c167c76a5941ea0,2024-03-07T13:52:27.110000 +CVE-2023-49989,0,1,8df1969668f4784b3aa305612d6516447c61c41a729e4e36322e658aab5c3304,2024-08-28T15:35:08.730000 CVE-2023-4999,0,0,a9caefdd4df7e960da2284d3ca94a538ae47e3d7f39d9ecb83734266ebc3a13e,2023-11-07T04:23:17.550000 CVE-2023-49990,0,0,1e5e5df2253f1be938172770085e3c41be08a9bc49fb8adca7ab6f2eb4169092,2024-01-19T04:15:08.763000 CVE-2023-49991,0,0,bd97a9ee7ae0f1cc74ef24bcda4231f713b9e1b0d8fdff1d77ef1e74196f05c6,2024-01-19T04:15:08.870000 @@ -237991,7 +237991,7 @@ CVE-2023-51381,0,0,dae38e2969db35298f7bb53595e944e9233b54858e286dfa2789b9cc64727 CVE-2023-51384,0,0,ec284ced8a028c80f45570d0f48e893a628f0d7f6a64a78835100e3773167767,2024-05-16T20:05:04.420000 CVE-2023-51385,0,0,851b9cad7a3a79109e0c97cd30aedcae9c6f131217d805171f55cda1951222c6,2024-03-13T21:15:55.100000 CVE-2023-51386,0,0,4989bef2423d43e06599dc7ab49fc1d8a0bef0f8e3a284aff6f4a4e0683c2314,2024-01-04T19:16:10.103000 -CVE-2023-51387,0,0,c4405da7b76d7f89b599f689d17fc76bbe0035b7d3e45bffd37a0182e1d26330,2024-01-03T17:43:59.510000 +CVE-2023-51387,0,1,61045a6f80132e19a6458cc843badc64a41bde5ee1cf5a76830bb756b79dd605,2024-08-28T15:44:19.793000 CVE-2023-51388,0,0,2e3ad8da9f38d091cbd8c98cd1a3aabae546f5511bbdfeff688c563085b3097e,2024-02-22T19:07:27.197000 CVE-2023-51389,0,0,c8183e674f9d5219872a33e92b5a1fdc0eae3b4f316b3eb093c7a493c5e168c0,2024-02-22T19:07:27.197000 CVE-2023-5139,0,0,1703630468285261ed8fc04774841fb8122f0aa2e090a95b0549614dd0a159a8,2024-01-21T01:44:13.437000 @@ -238263,7 +238263,7 @@ CVE-2023-51637,0,0,9dd5b13b347418006a53b7d73382dc77bb92ad47f1cbb8db408529d421275 CVE-2023-5164,0,0,b96e66d5438a1cd840a20c13041943d6f222ecbeaac68c7c2ffd9b6ed64d4331,2023-11-07T20:09:50.093000 CVE-2023-51649,0,0,70538420b22ae7c1ec835f6d0f9cf2b1648e5b5b1c043bf313fd06206fe66366,2024-01-03T20:05:01.863000 CVE-2023-5165,0,0,f7a9615603b2683ca9f4a9791f442b32b6c76896818992c01d44336b1364689e,2023-09-26T15:50:49.217000 -CVE-2023-51650,0,0,1864e9e4d2666ef8f9a21d52928152ce4d4e73effe472739d7c9a638b24e4ca3,2024-01-03T19:53:37.357000 +CVE-2023-51650,0,1,98710112de1b85c9e5cffb5b0fe011dc59cbdea61dca30c0e7335004e1cac08a,2024-08-28T15:44:19.793000 CVE-2023-51651,0,0,67d2a3bf08f4d907e981e638fa0d5228e436cc7d71dbb46f1110ed924b67b0d6,2024-01-03T18:32:41.760000 CVE-2023-51652,0,0,39d217c9de6d0571e49c9aba349c3d8cf90b339902c56edcd4df3013a87c71f5,2024-01-08T19:35:18.890000 CVE-2023-51653,0,0,340dbcfc1bdb4753b236d00e4b63c6786e60d215a986fbe2b29b43277f9525e4,2024-02-22T19:07:27.197000 @@ -241113,7 +241113,7 @@ CVE-2024-0017,0,0,e30ea632c5fd7e4383ceb5900aa731fb2d3b5c50d8f9b57582813b251f1380 CVE-2024-0018,0,0,eb1e6beb7617de808c00f24002cfa4ad37cdeb05dc3559f2748a83507aca8f33,2024-08-15T18:35:05.293000 CVE-2024-0019,0,0,99addb01bdd59dfa56c3bb78510b54e791e3b9af747d8108035ab5d4ed5b10b6,2024-02-16T21:39:50.223000 CVE-2024-0020,0,0,e73ca517c90039568523c56c44f0cf8b451388b3358b22e01f666a71e39cd157,2024-08-01T13:45:54.660000 -CVE-2024-0021,0,0,48878e30e65ca9b7752f91ec634b409988ea482f472219ebf9713d370864d726,2024-02-16T21:39:50.223000 +CVE-2024-0021,0,1,35bc8c578cc0cec7a2154a7bc3054d93602e915964abd6edd058f93c9e8b6d66,2024-08-28T15:35:10.670000 CVE-2024-0022,0,0,3cd621aee24b508cab60e42df908bea04c2b9934f8ccf5b596c88265f9b01d22,2024-05-08T13:15:00.690000 CVE-2024-0023,0,0,0ae19107c0f009088c14cc9607c2fcb734bab1e5ea02d37a78e27ee1213b97f1,2024-08-21T20:35:01.700000 CVE-2024-0024,0,0,5fb9489ab6bda1953438739836edf4a6b94bd74733037853a8a3c897eda90f7b,2024-07-03T01:44:32.010000 @@ -241126,7 +241126,7 @@ CVE-2024-0031,0,0,b1cddaec25187c54af4bebb0dcc796dbc4415ad876a9b9d3fa787304a60914 CVE-2024-0032,0,0,fc22f68933af2c7d437ee6e4910dddc9fa796af5b59e8f4b2de22081edbdf814,2024-02-16T13:37:55.033000 CVE-2024-0033,0,0,27344b7715a75d0aa82a7b18cd174c27fc55902f246df424d23b6d9f7df6dd01,2024-08-16T18:35:03.300000 CVE-2024-0034,0,0,cf6982fa2541b8054d4b654ea4c176621af3fadbf8e13dda28278df5290d9039,2024-08-01T13:45:55.720000 -CVE-2024-0035,0,0,9eaae678f1f9bc39ffb7f55e9bf0592ae82d1ab0298cf35f56b4c4901d254625,2024-02-16T13:37:51.433000 +CVE-2024-0035,0,1,7f9a041eb0797a9ce082ac40f420562683422751c556b2a3bd01f4fb3ad4e8b1,2024-08-28T15:35:11.740000 CVE-2024-0036,0,0,fff8c3e6a7e572a710532aa58189e21f41ee35c59b75c244857e50ee7d7b8970,2024-08-21T21:35:03.820000 CVE-2024-0037,0,0,afae0135406bbad6488057d26d0f96084f22f97b3b4cd7fc16729b7c9f861063,2024-02-16T13:37:51.433000 CVE-2024-0038,0,0,8a4c5cca5cece8c101e9b56b16a23bb12b2d4f0643275b101b5b221ef0addcbe,2024-08-22T14:35:04.960000 @@ -241671,7 +241671,7 @@ CVE-2024-0669,0,0,c742feb186482c5b850f8f47a8ad21b0a116882aa950f3b591c682f1d00d2f CVE-2024-0670,0,0,d7af230e4a779f07d41ef710c5466f9f1f09f5eed836a0b4fda43c6f633ecf53,2024-03-13T23:15:45.750000 CVE-2024-0671,0,0,da79a7432f09b3aacdd03314c2c3998286887dab5f0baa17017c9c249e32ba15,2024-07-03T01:44:49.547000 CVE-2024-0672,0,0,9f967c7c28c39681b8715c430ba5c3017f006b32b9fca1db8d250c48798b2ff7,2024-07-03T01:44:50.407000 -CVE-2024-0673,0,0,4c54d6ace8a6da73b35f6ae3662c7a8a0cb190f28c13e18415d4877f02b096bf,2024-03-28T12:42:56.150000 +CVE-2024-0673,0,1,621eebfb65bea0cab143f6093ba44b0bae2c8c23ef4511aa09cd166f1cd81608,2024-08-28T15:35:12.690000 CVE-2024-0674,0,0,2202c0e4a57a8020cd97aff2c1a5d1a1df2bd5f61035f83890c80e50cc47048f,2024-02-08T16:39:59.450000 CVE-2024-0675,0,0,31b4e65d3d10777ce13189dafebdfb82e520a928a3d9c7e18ba8db99a930c11a,2024-02-08T16:39:42.950000 CVE-2024-0676,0,0,435ecea72a5bce3bb04c7988a29d806f61fbeed7ad45e02290781eeac120a465,2024-02-08T16:39:00.907000 @@ -242488,7 +242488,7 @@ CVE-2024-1537,0,0,0fbbb428e5d6117794e506ac85f652d85cda102f4ab0cd6387f39041bf7253 CVE-2024-1538,0,0,9fc7289e31e07bb56b9eb9128e9d1b6ba097152ab59ee8378f006443d204bcca,2024-03-21T12:58:51.093000 CVE-2024-1540,0,0,8f40fefee3c1d81db1cb09d26a976b077353ff3be5e21ad7faf7c16fdb309e83,2024-04-16T12:15:09.617000 CVE-2024-1541,0,0,b86c8271de1114c26151c28b4a73ced0b46884833e2a03ab8cf945b436dc1143,2024-03-13T18:15:58.530000 -CVE-2024-1544,0,1,265716934ae5f78af4714ddd5770ee1721802c8c59f6325c2998c6704d523a66,2024-08-28T12:57:39.090000 +CVE-2024-1544,0,0,265716934ae5f78af4714ddd5770ee1721802c8c59f6325c2998c6704d523a66,2024-08-28T12:57:39.090000 CVE-2024-1546,0,0,25cf53baa34bb0b4805c5fe628b82b62aabfaaa6638a62497af9e0de14b093ff,2024-03-04T09:15:37.650000 CVE-2024-1547,0,0,8590deab7ee2956de6a0ef76618a6a96ff52727cdbc8e57258f00f60bb5d5bd4,2024-03-04T09:15:37.740000 CVE-2024-1548,0,0,6eee3f01728ed0fd4a2424a0afe7c369619c5f5c30c8c9a39afa9061aca1df3f,2024-03-04T09:15:37.787000 @@ -242593,7 +242593,7 @@ CVE-2024-1665,0,0,a3c3185e1ed099faa2439b0c30b394f32019efc90b2215de07a537212ac7a0 CVE-2024-1666,0,0,1f8333a8347ccf0940f5f18eb72bff97cea1045d2d21b82516336ffe9989709b,2024-04-16T13:24:07.103000 CVE-2024-1668,0,0,5d777dacf70894c13bb98378761ebbab538d2f58e3be366f3dd859cfdec3a507,2024-03-13T18:15:58.530000 CVE-2024-1669,0,0,7051f11d6175af0afa7adcb8852b15d12f5bb44802faedbbae321e1477b73fea,2024-02-26T16:27:52.577000 -CVE-2024-1670,0,0,a52bf5588667ab3c6352dda7d66363ad70218ee54b9823389483c89a38572a75,2024-02-26T16:27:52.643000 +CVE-2024-1670,0,1,1076fe172d6239bf170090e8e565b53f2a5e980bdc541ad08c209e2df3f767db,2024-08-28T15:35:13.310000 CVE-2024-1671,0,0,b90d151a59720bfc66cb3bbbb41d4e1a2a08b8f84ae511718307d6e0d6c90578,2024-02-26T16:27:52.697000 CVE-2024-1672,0,0,5df25617ae1b8580bd17e41342f3db39038751d4dea40ef6d92d4a83e8eeb0f4,2024-08-01T13:46:08.940000 CVE-2024-1673,0,0,72b6738109f060ca33cec8daa581f20d84f924c2dda86dec338ec0b1edf6aa3e,2024-08-01T13:46:09.737000 @@ -242871,7 +242871,7 @@ CVE-2024-1958,0,0,947fad07d36c41a06040aff36ab5d050d343db5e82c876a243f2fa9452dd0f CVE-2024-1959,0,0,20773b09a03765316a8a30eab375cea71fea1425346dc1ce35f18b661dfaac63,2024-05-02T18:00:37.360000 CVE-2024-1960,0,0,c755cb8cb954b0b1fd45e3b2b2de1bed153c08b47450f36752ad68952963c3e6,2024-04-10T13:23:38.787000 CVE-2024-1961,0,0,dc2f9d3f3b67fb9e1c6125531b0d8e4d845cdbbf4294ea07c79e7fd65b2f59e9,2024-04-16T13:24:07.103000 -CVE-2024-1962,0,0,ffb475f8d795ce7a22f27fbfa2e772151dc83af2adb83f902dcbd35bdd70d58b,2024-03-25T13:47:14.087000 +CVE-2024-1962,0,1,476e6b66d2ca2741a53c9d27ba89ea688db749fb510d2b8ea19c7c65ad5b2d5e,2024-08-28T14:35:06.573000 CVE-2024-1963,0,0,497da3e0c849986f6d35bf596bea7f2a65b5687d8cd64468172b927cfb094a60,2024-07-18T19:46:01.863000 CVE-2024-1965,0,0,5cf0344d0ba6ffdf46e178c3a3f0a22dafc37cdaf493620506aae0773081ac04,2024-02-28T14:06:45.783000 CVE-2024-1968,0,0,5d386d638a6745d5972e3da785c6fa3ef4f25b00eef921490d278858d9e57670,2024-05-20T13:00:04.957000 @@ -244096,7 +244096,7 @@ CVE-2024-21736,0,0,794296433b0b6c553cd106f1bd31a638f539e91ea6f82e61204a43660acdc CVE-2024-21737,0,0,59ff5ff1f6beafb8f0d3418ea62fa9e84b0ab8ac80ddfb91af2e3d93d716a188,2024-01-16T17:45:47.083000 CVE-2024-21738,0,0,ee493f18830fa61778a839e41065e0a164cfc7a69da412e6c6babcc4b17cc105,2024-01-11T22:54:02.190000 CVE-2024-21739,0,0,74c51cc55d726fea23dbc7423ad28b618c0ad3e8f250404a9e572e22bf0444c5,2024-06-26T12:44:29.693000 -CVE-2024-2174,0,0,9fbc2c6e66fd6aa69326bfbe0c65d38c6ce95d5bf28f75179473f88a9f8e2b1a,2024-03-23T03:15:12.243000 +CVE-2024-2174,0,1,69f2854ef3602f6c241fc54636cb33b9aa524ada04f0df9d9cfac3f6048da2a0,2024-08-28T15:35:20.553000 CVE-2024-21740,0,0,578e6e77253937b45696dc5f6043eefe34a835f238564d1fe1369311381e46c2,2024-07-11T15:05:22.467000 CVE-2024-21741,0,0,abad64de70c0fef6bdf30dcd2634a39b659714e71a96cc61f74db71b448be2aa,2024-07-03T01:46:46.537000 CVE-2024-21742,0,0,fae1ce375f3fcebe0111b56738c6b02117d77d438c12e42f2ce0251b9cb2427c,2024-02-29T01:44:04.040000 @@ -244421,7 +244421,7 @@ CVE-2024-22182,0,0,b8c6625a5282a72f76fb60314413b773d9f3fb9c9d9f485e5d536e19dd0bf CVE-2024-22184,0,0,e3b13ffe675f8579db3776363f4670ba9137f26137c3f424c46d120f2b78c4bf,2024-08-14T17:49:14.177000 CVE-2024-22186,0,0,59ecddd100ddcae06a7ecf9fc641630f9ab4f57ca25d5313e480ef6c07a40e52,2024-05-28T17:15:09.680000 CVE-2024-22187,0,0,764c633f29a9b7a4988eca707a5f5a20cd222e9e3850a0ea108932eed046a25b,2024-06-10T18:15:25.660000 -CVE-2024-22188,0,0,03415a2518a08cc994830b2efc3f8668d48494757b9d738d3e97148d59c420d1,2024-03-05T13:41:01.900000 +CVE-2024-22188,0,1,9401f81b36fcbdf2dae8a78204f4b25a3c0ed74442678101e58a7cdc0376abe2,2024-08-28T15:35:14.437000 CVE-2024-22189,0,0,fea0be1a5a7409c880f87752eeb084fafd5b6d1284d3177e6521b5c7516d6ecd,2024-04-04T16:33:06.610000 CVE-2024-22190,0,0,e6ac33b356ba6a74674e45bf7cdf7d2f2e69f941856b85a391b927bae4fad4a8,2024-01-18T13:48:07.553000 CVE-2024-22191,0,0,f7f1b03cf67feaead11389a4af47a24ff41e590c594aa0c037973685b4253fd3,2024-01-24T18:13:53.947000 @@ -245030,7 +245030,7 @@ CVE-2024-23212,0,0,f80d0116e96d75ecefd545c3526dcd4d5f88bcbed5b339e1c95b1820f7413 CVE-2024-23213,0,0,3accb2e6ca7cc402e236c9474680e18edadbd0d691e602685b9c7a01131e56df,2024-06-12T10:15:29.957000 CVE-2024-23214,0,0,33119634a46fa5c4e530acd0e9c618db34847fde568cfa47bd7b42b58ac780ef,2024-06-12T10:15:30.080000 CVE-2024-23215,0,0,33fc650ebd8d97f7539b32750e085a2fd8b81965edd8ee0561acd57fa017b4eb,2024-01-30T16:17:32.130000 -CVE-2024-23216,0,0,8897bfcb1353d1935e18fd00e626ba4edf75a60eeb2d0f60d96423fe2506ea74,2024-03-13T23:15:45.953000 +CVE-2024-23216,0,1,f8f18e7552f290902a4ebbaf17adb29e0e3fc3f3d4000accb9bf87224755f7f4,2024-08-28T14:35:06.780000 CVE-2024-23217,0,0,22b8aabc2c537f06727d28ccece5638ac7f57c64b05d618b0085cec7c37d61be,2024-03-13T22:15:09.273000 CVE-2024-23218,0,0,764d9591d3c5e993d8e4b9e38693ec8072deb6341bcae3b3215d2e62a14277ea,2024-03-13T23:15:46.027000 CVE-2024-23219,0,0,478ca77553ffcd9677d8ceaf589ef8d6cf6bae32d2a8df76b85c410ad74b3348,2024-01-30T14:36:42.017000 @@ -245437,7 +245437,7 @@ CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9 CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000 CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000 CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000 -CVE-2024-23721,0,0,79fe202cb30d537a04fdd87ebf2ebd3911bebfb1a0ce8268579dd48022b3a9d3,2024-03-21T12:58:51.093000 +CVE-2024-23721,0,1,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000 CVE-2024-23722,0,0,af1e6a2b53efd211283ec4f6a153b9c2bd466feef4ec2b55fd6db947ef4fb0f6,2024-08-06T14:35:05.600000 CVE-2024-23724,0,0,5cc76252bcfe665701c3f11744cfd264292f873fd21df1c2782e1c197e0c01a4,2024-08-01T23:15:47.180000 CVE-2024-23725,0,0,96d1f58f146e10084452af188f967aa7d2c64d922f58373c2c0f92aec9556706,2024-01-29T15:25:48.110000 @@ -246449,7 +246449,7 @@ CVE-2024-25344,0,0,db69ab30d7794b839b183db3e507228c9f3f45497af2375243b3fe88a539e CVE-2024-2535,0,0,1d4fc1154e21273a7c74f61b7c8874d973288768c48e8247cc99c965af9b7c7f,2024-05-17T02:38:18.023000 CVE-2024-25350,0,0,3eadafce3b2244ddf5f3884efc711bcacedce55f760934f937927ed6e35502b0,2024-08-01T13:47:41.340000 CVE-2024-25351,0,0,799dbc66bff5fa6efdf5aa91495ce5a0210c4cb89c79f9796068de8220467c77,2024-08-26T20:35:14.720000 -CVE-2024-25354,0,0,05e4e4b9487522fa174527b30036421abbaaddce9ac4f0c3f7fdb3945144000e,2024-03-28T02:01:13.303000 +CVE-2024-25354,0,1,256346a489531f9aa59a7b9890e8d89008038eb0fd76238658fbc486e3560812,2024-08-28T14:35:07.993000 CVE-2024-25355,0,0,9e4c154c10879aa65df3f836e3d26a161aa9d5b18c5f9f98e84ee39f0e0f3042,2024-07-03T01:48:45.420000 CVE-2024-25359,0,0,0fb20cbc3a9d97e4b1c7aeba16baa279c02f24b91366fceb9801ea8cdef6ca08,2024-08-02T20:35:24.740000 CVE-2024-2536,0,0,65acd52804d1fab5b7f8fb23c09b74c0bf5acd3bf488cb768800ded49c99706e,2024-04-10T13:23:38.787000 @@ -246919,7 +246919,7 @@ CVE-2024-26045,0,0,0acb4c430eb04b486f9fde8afbebe04bb30c7a2da9501b59437c922e62ac2 CVE-2024-26046,0,0,5c87a28b13d53ec29b89a2b33427517db21012c37c446a313fb6274d8fa5a520,2024-04-10T13:23:38.787000 CVE-2024-26047,0,0,148096905025fd63cbc95f27e9e4e0c5f23280eef70892c2f079c5329b94e086,2024-04-10T13:23:38.787000 CVE-2024-26049,0,0,a3a34d9b7dae7c572a170c4cf9ad06366559734e7c052afbd0e4cb731a5c408a,2024-08-07T13:15:59.723000 -CVE-2024-2605,0,0,b2d4cf90c6de3b45e3f9ed94204d3e5a08b258f5d0756580c5b4c799c2f0892d,2024-03-19T13:26:46 +CVE-2024-2605,0,1,349e4409ed80d6811abb3d6a22d4a1c2580eb4cb5b90719226cde56ad4b7d78f,2024-08-28T15:35:21.410000 CVE-2024-26050,0,0,a01e15c84b45a65b3bc336a569ca46f534ec28925a3745536846dbd737880774,2024-03-18T19:40:00.173000 CVE-2024-26051,0,0,78bc48859c38750da39204fe9139ed7326b9440e064a7c71bb9438b77aa20ed2,2024-03-18T19:40:00.173000 CVE-2024-26052,0,0,b304109295db8f5f3410f8f04ff1bacf299ca38b40fc697f2ab4ec3a5eabc71f,2024-03-18T19:40:00.173000 @@ -246963,7 +246963,7 @@ CVE-2024-26086,0,0,ae34cc70c1fb5245418ea1021c46e145477ed2510ed19be388b0597933b58 CVE-2024-26087,0,0,886690623538c9b67d73b3140abb23679c4e72a1155e44ccb96173e256c726c6,2024-04-10T13:23:38.787000 CVE-2024-26088,0,0,aed72cfe3c05269ae6fa7444f7478df5bb7d6d6fd37a95c7c481f7f0efb015d9,2024-06-14T20:10:01.653000 CVE-2024-26089,0,0,87f38a9968c3e4028ac78d2f547942af5af438b7e5b9b22788cce73b35aca8df,2024-06-17T20:32:03.657000 -CVE-2024-2609,0,0,ec613e0226ae1c6e66be2d505cac709a06bc2677ca463517e1c9a835356f76d0,2024-04-22T10:15:06.997000 +CVE-2024-2609,0,1,b6301650fec4122c3c02b6e335400036f83dab48aa35b0d865ffd587777c27c3,2024-08-28T15:35:21.617000 CVE-2024-26090,0,0,ed98f35d571423c5ef53e825d7ea9212d7ca429e14c4d90b79333d7179f2c1a9,2024-06-17T20:32:18.073000 CVE-2024-26091,0,0,432c29cd1da1e6c9f8652a2bc2bfacfd01862e5bf100718ad43ba6760143b36d,2024-06-17T20:32:37.817000 CVE-2024-26092,0,0,67476159c2a94aa6c3caf2c7ea973d42f985c77e89e69f10705b74d3b72d9b65,2024-06-14T19:55:31.347000 @@ -247023,7 +247023,7 @@ CVE-2024-26146,0,0,554fce310a1cb01edbb3b3f06f7dd6d6c768a6125a05ad6a5f05315540519 CVE-2024-26147,0,0,31938bfd609e440a2f1803807cf5ed67ed95c5f9b331c66db59a00a1433a779e,2024-02-22T19:07:27.197000 CVE-2024-26148,0,0,db984f5e17193fef4f237cfc03c668c1be3c9c198ae40220b6dfc6aeb32d7d9f,2024-02-22T19:07:27.197000 CVE-2024-26149,0,0,cdd4ff9e035195557225db24049cf1e570f0b2e25d95a9e4fdf8b2509a4f3d3a,2024-02-26T22:10:40.463000 -CVE-2024-2615,0,0,539f31143667ff1eb38f270b92ab7ae59e882df7a3196a16581d42fa0f4b99be,2024-03-19T19:15:07.197000 +CVE-2024-2615,0,1,96fccb91db04540134f2e85737f4c1b81249de0dc9bd5a3d73e2ffbfd4e26379,2024-08-28T15:35:21.843000 CVE-2024-26150,0,0,724a23f6f5cd2b08e078faf9766b70ef43f45650f38390687bb0597c880332b3,2024-02-23T19:31:25.817000 CVE-2024-26151,0,0,e1dc838a6d430f2f3bb000afc8645752ee52070eab909d9c789d043adb639eb1,2024-02-23T02:42:54.547000 CVE-2024-26152,0,0,be8646b007362130f2d7e4b19e1e011379a1ee505dd31fab682fd492bc0e9a97,2024-02-23T02:42:54.547000 @@ -247122,7 +247122,7 @@ CVE-2024-26245,0,0,d8e7715693a4c17db96124229016576d132c978af86f165ed843021cc0e24 CVE-2024-26246,0,0,281c00482b3c35bb6fb58282b68f55f76ce6bc574686f37dcb024dae18841f5f,2024-06-11T16:15:22.197000 CVE-2024-26247,0,0,2e08eb3ba6b627c10ba27bd8963a5aabfaab07773e08696de8ef39c9e2d29c88,2024-06-11T16:15:22.333000 CVE-2024-26248,0,0,1d69ec410d789e5cecdce5ca5f00f4cb4dc73522c17a80577a09df4303fbce8e,2024-04-10T13:24:00.070000 -CVE-2024-2625,0,0,6eddd13a9849aecb6e1a254cdd1d9730c77cad376c3f643dbb1be2684f268029,2024-04-01T15:32:17.010000 +CVE-2024-2625,0,1,bf9861c3991010c842a10750333614c270100ec9c0d1879521fb5a22ee29df8b,2024-08-28T15:35:22.080000 CVE-2024-26250,0,0,361a4a598e17b5e0caa4dfe07f1d82a4b2b3caf0473c9778a9a5173e920f20ed,2024-04-10T13:24:00.070000 CVE-2024-26251,0,0,752d1c2a1c430ddddba02d64b195b606d79a2c3854c081fbabcf7b1750edf415,2024-04-10T13:24:00.070000 CVE-2024-26252,0,0,a16ea7a04b440699076d4a90d57b94e69adc561ff365215a47bfe0edfb85ff13,2024-04-10T13:24:00.070000 @@ -247178,7 +247178,7 @@ CVE-2024-26307,0,0,69e56c1207bd415bbef84f2246a3f4dffa28e9109056e4a053129ad394592 CVE-2024-26308,0,0,b4d73560210ad1a249254bb49e208942ee75ee7f41147c3b9e47cd68fff84e87,2024-03-21T19:54:03.230000 CVE-2024-26309,0,0,2640b5966073fd3d518fa5abac6bf90144529b272adda5f9f180e91c567c3f6b,2024-03-08T14:02:57.420000 CVE-2024-2631,0,0,c40f6cd20ef48d6d5340c38d8cfe42cec4782b3ae9f2af1e0914d012954c4b8c,2024-04-01T15:23:45.590000 -CVE-2024-26310,0,0,77af36c7b5aebe9efa7365bb28330c17072021e2670c3e4923411e43bc947a5b,2024-02-22T19:07:27.197000 +CVE-2024-26310,0,1,69cee22c675c3146c38aababff9be493f09176b7ddb80cd90cd4be608f2c217c,2024-08-28T15:35:16.490000 CVE-2024-26311,0,0,28ff8a1b0384f422415c01ccf263a2e9d55cfdafba39542393811f1550f890d2,2024-02-22T19:07:27.197000 CVE-2024-26312,0,0,63211e4b9a2e957457396397837a5777078f70d897b833c1c389cff9a53a6fcc,2024-07-03T01:49:37.810000 CVE-2024-26313,0,0,f4cc2c8a31f2a657cb8e56530069fdda1b7331701b9b323e9b20a0d62c414aa3,2024-03-08T14:02:57.420000 @@ -247247,7 +247247,7 @@ CVE-2024-26491,0,0,3d9a25d9d13dab43f4fccb79edc1a9c15bdabd787c28cc0e8ec66c7f9fee3 CVE-2024-26492,0,0,776536ff3e72d199deab8e9d9e1f16da2e95ac241f37505598569b095df6bfc6,2024-03-08T14:02:57.420000 CVE-2024-26495,0,0,3c32f7bed61a7925414ccba584adc4484e3c603c024ccad8423c6f927ec096b6,2024-04-03T12:38:04.840000 CVE-2024-2650,0,0,4b5612c4084720b2f75ed069d914fcdc0a38f0f53c7b3b04b755c2a4e98778bb,2024-04-10T13:23:38.787000 -CVE-2024-26503,0,0,8686cfe4720c79e553e700dcb64f0f774a686ccae695a788eb5a7afc2e5764cc,2024-03-15T12:53:06.423000 +CVE-2024-26503,0,1,f96c865fc711ca69d18c1db7a096f4b4b623c09f9b612372bb3c8a1f56bc4c7b,2024-08-28T15:35:17.227000 CVE-2024-26504,0,0,666faf787e5dc390b263f6f43b439704bacedd4c95ae744503624ba00795620b,2024-07-03T01:49:41.007000 CVE-2024-26507,0,0,64f088a446d983fef0e9e5fe7e57b9067d595ae9ecbc4c9f4bac89b612f6dadc,2024-07-03T01:49:41.820000 CVE-2024-2651,0,0,bd146bedf6ebe2167b2a748a6767423198ce44fb77df6650381302c98af6fd86,2024-05-14T16:13:02.773000 @@ -248294,7 +248294,7 @@ CVE-2024-27734,0,0,bf6aeaba46a01a9b67c56dd711450d0582ae90b1d0bd0418b821f57fcd663 CVE-2024-2774,0,0,e66d8123d132aac12382a6e2ac593a72a85e469f411c6020b7cc9170c2075820,2024-05-17T02:38:29.590000 CVE-2024-27743,0,0,b2fe2e7ce3a309e376bbb21a5e8eb0f8c98c444e26e52cd761c800a121c2af4d,2024-08-01T13:48:44.883000 CVE-2024-27744,0,0,56bcff35b4b37cb35913a0cb22dd08c69cc0aaf691322c9f45e718a27d4a69f3,2024-08-16T16:35:07.307000 -CVE-2024-27746,0,0,25c5d1637666144aa24b9e78e08712d087d46315d29be0eb97ff37efb1a8968b,2024-03-13T07:15:36.470000 +CVE-2024-27746,0,1,f61708904df2f81aaa7be546a108ac9b8025b28332ac272646509eabc1bda1ee,2024-08-28T15:35:18.103000 CVE-2024-27747,0,0,43ca1ef187762467880e06e47b6be069096be41453e51c48b4193416f6039e25,2024-03-13T07:15:36.523000 CVE-2024-2775,0,0,46caf5afd9e0a541c7aee346d23d915891b1af22a996efec3edfa49253e458bb,2024-05-17T02:38:29.683000 CVE-2024-27752,0,0,b5e0902297e1d9d8f0b79a5fa02c330bc4447f06ee56b81e4776b650e157a62a,2024-07-03T01:50:45.653000 @@ -248767,7 +248767,7 @@ CVE-2024-28328,0,0,88f82b4f564bb2f0cfcfafe664c725ce4612a144351633fca17b714d7ef38 CVE-2024-2833,0,0,2bc6d91fce23c79b9817f7554599630a708e7859b230a9a2bced401cbd1dcd51,2024-04-18T13:04:28.900000 CVE-2024-28335,0,0,1f0f16000380dd3374bd37cd33265b4629fe1de221282bb913749763f1030c56,2024-08-06T15:35:11.200000 CVE-2024-28338,0,0,4058229b720fcbbfc31bf8d1e879b9db75368619bf7702bfd3d1c419a7233635,2024-03-12T17:46:17.273000 -CVE-2024-28339,0,0,e7edfb08e526caa3026f659d21730d02e6fceb32876a36cf2d55238da5d3b5b6,2024-03-12T17:46:17.273000 +CVE-2024-28339,0,1,1c5cb4ff3f5e62c64fce21c9b445d5a13cbabae48573837fd8e9a43861da7ac6,2024-08-28T14:35:08.337000 CVE-2024-2834,0,0,b28e87c6f045d84badec2f950b6e65f36270629b305c79d294240554601bad8c,2024-04-08T18:48:40.217000 CVE-2024-28340,0,0,df1f6b0e64753fa9fcb1e44290eba32c1363678518f4321559c5625366bd5374,2024-08-21T16:35:05.830000 CVE-2024-28344,0,0,07e206e8ae7b1052e93419db971a4a320fe24d9f630cd6feb731f0be928f9073,2024-07-03T01:51:39.137000 @@ -248832,7 +248832,7 @@ CVE-2024-28515,0,0,a1e2389b4555eab5e18310c7e283a6a35bc4bcaedf003e200c7e78de4e2e3 CVE-2024-28519,0,0,8e20e3d590247971a9d8000bfa92fdfdad67e4416371af4c691b0cf99deea50c,2024-08-15T19:35:08.117000 CVE-2024-2852,0,0,ce3b26e82372ba3a1ea7a513f638a60f6b521dabbda2b7b15730e3be31569c45,2024-05-17T02:38:34.220000 CVE-2024-28520,0,0,0d1f20f1f11c459c615732a3ae08b6276ad3a3ce7691c30492f9301c8f89ba87,2024-08-01T14:35:07.467000 -CVE-2024-28521,0,0,3e889be75d13efa28405295dc4871a57c35f44292a958a216db39725fc259f8b,2024-03-22T12:45:36.130000 +CVE-2024-28521,0,1,4c470a16411ba9b060ae66f422bfe7a7a3db4fe1c8d1782aae757e57dba97825,2024-08-28T15:35:19.147000 CVE-2024-2853,0,0,d81bfe0f2e8d27cfb2c79cc8c8a264f27a9770cb3cd0ef6dd08d9ccd4f7731b4,2024-05-17T02:38:34.337000 CVE-2024-28535,0,0,b3d344cd79be8d85dbbdedf90a4aca4a63b5679340011f1e54eaf1af4f8bc64c,2024-08-01T13:49:07.553000 CVE-2024-28537,0,0,a1b289879a7e37eeb256b0155a9bf07c4755d98e64b0810b5b45c7e328ef254b,2024-03-18T19:40:00.173000 @@ -248896,7 +248896,7 @@ CVE-2024-28665,0,0,1bcb843df69123849882283a8f9fca9c4abb51adf88a0a7fc25bcd7f8392f CVE-2024-28666,0,0,9909b1d8b42ce81db5680c2cff308836e3dc86a07602ebc3692c51a5608b0d49,2024-08-02T21:35:23.507000 CVE-2024-28667,0,0,a722c74094b46413cd2f0e1e6663b7ae2104332e1b5c605e7cc511a2a8371374,2024-08-05T19:35:10.487000 CVE-2024-28668,0,0,dfab810650daaa38b417cd38363fcb259e164356905554402cb2ffe391f0ae90,2024-08-02T19:35:34.313000 -CVE-2024-28669,0,0,7e7c51ad09a2f0694752bdd394c9ed2f89e1b1247bb99fcc406852b79b139fc6,2024-03-13T18:15:58.530000 +CVE-2024-28669,0,1,c4afab4e693b87bd1d4cb0ea504889e1927ba508a176fb9bd7063780045543c4,2024-08-28T14:35:09.157000 CVE-2024-2867,0,0,22ce17bc91c68b182edb0434ac76ac7f869c6c754fce9597b9e7c40c50afa2f7,2024-05-02T18:00:37.360000 CVE-2024-28670,0,0,845945b47c5eff5f2f3fd7e5bf1a4a985e355f96d0a2e2e63d9e2637032bebea,2024-08-15T20:35:07.023000 CVE-2024-28671,0,0,9a1d1290de5a4ba6867a05ae1d283c711cdd9d5647299d6bacd992d6df39a6cf,2024-08-01T13:49:10.897000 @@ -248910,7 +248910,7 @@ CVE-2024-28679,0,0,105ed47445b8d9fc8d56f311cb3b3bd3771e3a0f797a39fdf0ae6eee229ff CVE-2024-2868,0,0,0d0f218c7c83d10c9f9d6ae0e3c918a300514bd5c38acefa57e4da2fb68b6b16,2024-04-04T12:48:41.700000 CVE-2024-28680,0,0,2c015a2a3060000c7ef4f8456bbc810496f8be9f148fccbda02f285f4310a0c8,2024-08-15T20:35:07.960000 CVE-2024-28681,0,0,4b7cba0eeeff2f30c6b385de9946c7001ab8d0046bea262780a6c07cbb70db8c,2024-03-13T18:15:58.530000 -CVE-2024-28682,0,0,02be1c405dc5aebe82585b37c498baa25485b44921e1eb4fbc423effbc8757f7,2024-03-13T18:15:58.530000 +CVE-2024-28682,0,1,4f5f2d89be528d37359d245e4477bd20041973e3a5c07eac11756c948035a466,2024-08-28T14:35:09.923000 CVE-2024-28683,0,0,a84750ef7113628223a83f3f1bafccf8cc7ce4d93141f0176c20c984e9a69c9f,2024-08-15T20:35:08.767000 CVE-2024-28684,0,0,ad6bf053cac6fb6852a9113f5958a7b88b0baa069360a39369fc3cdf983cbd42,2024-08-05T18:35:16.690000 CVE-2024-28698,0,0,396cba3e1e1963c7f40bf85fd9f50e44dce9235019edfebcdaa211dedffb5752,2024-08-01T13:49:12.527000 @@ -248948,7 +248948,7 @@ CVE-2024-28752,0,0,201eab5c3984ec2eeccdd8a718f765ccc577edf4cb5cdd6dc7af0c666b0e9 CVE-2024-28753,0,0,9b7534424fcafcef08233e24d8609288fcd5326b5da35fb8ff9f88b8b46d19e0,2024-03-11T01:32:39.697000 CVE-2024-28754,0,0,b825517ec09be0ea62da6389e64d9784f7fd2758d87d7ecb524c18a858c8d2f8,2024-03-11T01:32:39.697000 CVE-2024-28755,0,0,a971352ccfd1d9312c8fc951387a64198c3d2967458d020bfed491bd6af81566,2024-04-03T12:38:04.840000 -CVE-2024-28756,0,0,5b07667d64b59a53b92ae907c285ea2c36c3a9357e58b66af188afa8cba54ab3,2024-03-22T12:45:36.130000 +CVE-2024-28756,0,1,382afa2a84e7631da7af99644d58f88393f4012cb74b7d61efdfef4f7d7e8fc8,2024-08-28T14:35:10.690000 CVE-2024-28757,0,0,38e35916340cc7b59636f71fd12bb6c865345cd709ec2ad97abfbd0121697391,2024-05-01T19:15:22.567000 CVE-2024-28759,0,0,dcdc9bf6250fc5bc69b9326038bec864cb143a6aab76dd04534ae889181ed6fb,2024-05-14T16:13:02.773000 CVE-2024-2876,0,0,96b96473aca77aa576cfbfd4fdd62bd6bbdb12d76f0bee3d312855d2e34a9cd3,2024-05-02T18:00:37.360000 @@ -249257,7 +249257,7 @@ CVE-2024-29128,0,0,77fce425c49ac339ee33e12f1b3878cbdddd513fcac87acb1ce6cb06f4726 CVE-2024-29129,0,0,022433b928b77b4e11df8137329a8e805ce777a51e5c390569874776ed9f1d92,2024-03-19T14:31:27.883000 CVE-2024-2913,0,0,f13b68719789b0ec1d0ac3f00293efe13ae2d2476f7393cb029a386c10b9d5fb,2024-05-07T13:39:32.710000 CVE-2024-29130,0,0,3c5ab042ef8fedd1c9b8f15ab543cc07d9c157ccb5fa600e78e62121be1aee44,2024-03-19T14:31:27.883000 -CVE-2024-29131,0,0,0af7ae59534dc0f8117c2316ffa4f87a57fd2178764312c7def53003e8bde324,2024-05-01T18:15:18.090000 +CVE-2024-29131,0,1,2ae4211a49a3f62b40c035e6593efbeb170b4f6145b3bd61df41334ef04dc0f3,2024-08-28T15:35:19.953000 CVE-2024-29133,0,0,36561ecc1d25beeebffdfe71774843942f6f7498bb13fffd291f6157a4b0ff67,2024-05-01T17:15:31.283000 CVE-2024-29134,0,0,64d7104dca1a7039d75ee2143ca2d6681014df1f5270f4434e5925abd69f5cba,2024-03-19T14:31:27.883000 CVE-2024-29135,0,0,82b1b4a3f7dec94f8bbc60ae3c283e311437a5e9bda89959429180db805aaa10,2024-03-19T14:31:27.883000 @@ -249368,7 +249368,7 @@ CVE-2024-2925,0,0,504f348571b0724954329b33d6f2a7f319fa5d707d1f954272102f96b1330b CVE-2024-2926,0,0,6100f4386bbfe5450836eb65f9370c21adbc96474bbe6cfb9f696f055cca979a,2024-07-05T17:14:10.767000 CVE-2024-29269,0,0,ebc1b5f27d771e6ee93ac1603f9526ec43c4cfe05c644b51205833a4ec58d1da,2024-08-27T18:35:06.583000 CVE-2024-2927,0,0,f3bb3c9a30a99b51229870b4966b198934ad11007ef0d3791756757dba92d38b,2024-05-17T02:38:37.557000 -CVE-2024-29271,0,0,b4d3906e78736be6eca15d6469d3358952e211c417b217d384055581eda6bf29,2024-03-22T12:45:36.130000 +CVE-2024-29271,0,1,5402ce904d944d492416abac8e4f4c9ddf77369e744c2e469a951401a76b3ecf,2024-08-28T14:35:11.473000 CVE-2024-29272,0,0,b270e02cad18e4df92dae6e1cbf164c1906a980efefcc9e36d9450cec32eecab,2024-08-01T19:36:05.820000 CVE-2024-29273,0,0,c5afb013b946ae2c73d92fcbdb0c49112c4146cc606c2998618843bfb65fffd8,2024-08-27T21:35:20.250000 CVE-2024-29275,0,0,019299934d2875a3343e07edeed968a51219f7dc129478a92947831a4c668c96,2024-08-01T13:49:27.553000 @@ -251064,7 +251064,7 @@ CVE-2024-31808,0,0,4ca3797160f40a508a2f1647ee565c7f4dfaebc9f383eaea19fce840eda82 CVE-2024-31809,0,0,e4cdf5792005cb2f9dfbd37d300dd109766c0a4513cca5e9d46f263f8d455de2,2024-08-01T13:51:10.623000 CVE-2024-3181,0,0,6b9f7aefd2f6d55b0cd7164186830f2507ec3f62ff8140326ea78f2d9a673378,2024-04-04T12:48:41.700000 CVE-2024-31810,0,0,26fe393e9644e5bd4e624b86eb0f71b590d6fd459475e3a5579f903609e5f639,2024-07-03T01:55:23.187000 -CVE-2024-31811,0,0,9a549fec1d4f685a8303569c470c6ebd4d0bdca04ae38e3919c878ee4a54ea27,2024-04-08T18:48:40.217000 +CVE-2024-31811,0,1,ff265894abb5ed6badd79b2bdff04a0b300703a00c33228bdaf868c0272d19f8,2024-08-28T15:35:22.300000 CVE-2024-31812,0,0,e59d4fa5975f0119da4cfd4900343a38d484d0506f79ca6ee0996d32731f70d0,2024-08-01T13:51:11.397000 CVE-2024-31813,0,0,29e23c3e48f06162164aa0d6475a9681cc76184b2c7d19a6059995c0e6dd7e35,2024-04-08T18:48:40.217000 CVE-2024-31814,0,0,9e4411c92895e7b973cb8cdaa5d063ce91670d843374d0de8b17a9f579b1c377,2024-08-01T13:51:12.177000 @@ -252737,6 +252737,7 @@ CVE-2024-3419,0,0,55e9e939cce7031c82bff2b248ad3247eb5f6b71fadfe890fcd9e67ed87233 CVE-2024-34191,0,0,dbd580573375fd2d1820adc0049af00ef94f1f54fcce834415d344bda1271c56,2024-05-14T19:17:55.627000 CVE-2024-34193,0,0,e28053bd0a22d022848badc9c3f75e2fb164790fa29e948e479e4871e120d21a,2024-08-20T15:35:11.077000 CVE-2024-34196,0,0,fa10f060dde56de72ad527f194a43f50d5d3befcfd4eea3294712a1774de38b0,2024-08-01T13:52:15.947000 +CVE-2024-34198,1,1,ba93ef8fc5dbbb63bf24a83115f601ac65bb25dbfcfc498c53d09eed142379f4,2024-08-28T15:46:39.613000 CVE-2024-34199,0,0,27f51e6e9a085d1edb0a1380e0bfff4433e52f8f9e25d5bec96a743b9a9ffd85,2024-07-03T01:59:29.647000 CVE-2024-3420,0,0,4a79874e63037882cf5f1fcd7dd6a1cad0c790500da420cf829e4ec3a26df5fc,2024-05-17T02:39:54.717000 CVE-2024-34200,0,0,233f6ce04f4e95f03eaabab680c92f73f949e711725c4041d58add8301c7e04e,2024-07-03T01:59:30.427000 @@ -253451,9 +253452,9 @@ CVE-2024-35312,0,0,81ee7e5cffa0828718ff42985b5f71e3223019ea36fce71fb3a2d6856e31b CVE-2024-35313,0,0,1eb4867830818e97987762ca58d043d2f7f53fc926bce8bfb2e66b630c99ca4a,2024-05-20T13:00:34.807000 CVE-2024-3532,0,0,861b69b5ea2c2097afdbe40dd2c40123c9da7c07e730e8c939be6340175b992f,2024-05-17T02:39:59.520000 CVE-2024-35324,0,0,97e62876b974bdb37d65a00c14d6ae80121537e286249b5814c033b73ffdbb1b,2024-08-20T16:35:11.473000 -CVE-2024-35325,0,0,7f342c8939e3e3aa37ecb57604b9a53d7d3e875b227b792abf497049e1b7cce8,2024-08-23T15:43:02.650000 -CVE-2024-35326,0,0,ad7cc16d1aaa5f108e8887341cf441bba2b53899da4792ec6b77378bf1ba364c,2024-08-06T17:11:56.813000 -CVE-2024-35328,0,0,fb4ef24959ef3b86e1d1e2a626668146540c0ab6d259d48f6d635a7a92dd50be,2024-07-19T15:25:50.030000 +CVE-2024-35325,0,1,4b80666b63fc2d080ad0ef78d60bca54774976fcbb99e3bbc447d091344fce9e,2024-08-28T14:15:08.433000 +CVE-2024-35326,0,1,785b7c0f0611cee707ab55e4e91e7281ee39cefedfaae81dcfde51906229e1f9,2024-08-28T15:15:16.590000 +CVE-2024-35328,0,1,e32cbb90dfa97693b919430d56bab63542e4093ad25a37c20d599be5a44e71ea,2024-08-28T15:15:16.750000 CVE-2024-35329,0,0,4d7aa78fa054a9381ac03b56ef696af98c93a3855ee38f8a31593aacb03aa73e,2024-08-02T03:15:51.520000 CVE-2024-3533,0,0,488bd266f4041c85454e2052fe9f29a33b96935dc189b43a270de9d8362e90d3,2024-05-17T02:39:59.617000 CVE-2024-35333,0,0,cce46e99aeb1eab01d831e139f6817035aabe6e9396d1f88c05286346cde08b0,2024-08-19T16:35:15.757000 @@ -256287,7 +256288,7 @@ CVE-2024-39571,0,0,5f5a00a374a36754f81b606fe5b7617af673280667e3ded939b747c7e23ff CVE-2024-39573,0,0,66fc7feceb0e35a8b2e536fb0fe145ff47c70fa679791c05a2dafe67c9ad9e6e,2024-07-12T14:15:16.400000 CVE-2024-39576,0,0,b954c37b27403600557da0d261dd953de929a61b04f025c8697cd0d77090d715,2024-08-22T12:48:02.790000 CVE-2024-3958,0,0,6a863b448c805f7bc2ecb55496071d989e4d5758f7f91c3bce9d94ca75a26261,2024-08-08T13:04:18.753000 -CVE-2024-39584,0,1,1d0a6aff0073f4836d9654764326ceeb368acd09f92344e463ab3214871c70e5,2024-08-28T12:57:27.610000 +CVE-2024-39584,0,0,1d0a6aff0073f4836d9654764326ceeb368acd09f92344e463ab3214871c70e5,2024-08-28T12:57:27.610000 CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000 CVE-2024-39591,0,0,6df5bfa73938e4812212735bad6342100faddf79ce461f960eaa31dba3eab077,2024-08-13T12:58:25.437000 CVE-2024-39592,0,0,092a544949de7319ae89291bc739a96163c6c0d37a46e6cc9f12df6e56b452d2,2024-07-09T18:19:14.047000 @@ -256411,7 +256412,7 @@ CVE-2024-39746,0,0,6375fbb4b5bb9c905c41c7f4d0b9ebb7e249deb4532114f1d7954e0a6335a CVE-2024-39751,0,0,ca850876f5c8fc4ecaaca63a8428279a2bd033ba704cbd228180dbe8f0c1635b,2024-08-06T16:30:24.547000 CVE-2024-39767,0,0,3e2d929a0dec960247b2d08752313be7fe5d03de12cbd71addbfff64b71f8489,2024-07-16T18:04:02.993000 CVE-2024-3977,0,0,e9ddc667440c6dcbe059212d85a4e046d10d5ad7b4b151b497bb4963c631de68,2024-08-01T13:56:47.833000 -CVE-2024-39771,0,1,3ba9b721b5c229a6c3ffc099ca1090515a4191b0f891c631b67f12313c68d6a9,2024-08-28T12:57:27.610000 +CVE-2024-39771,0,0,3ba9b721b5c229a6c3ffc099ca1090515a4191b0f891c631b67f12313c68d6a9,2024-08-28T12:57:27.610000 CVE-2024-39776,0,0,8b39df47cbc8ffd8596fdbf74b3d83a860b8891919acced573331707234996bf,2024-08-23T16:18:28.547000 CVE-2024-39777,0,0,4bc122687c91590f9c335b41e6e79e33e521fd532335f92edd7cb7db8b08fa07,2024-08-23T14:36:48.817000 CVE-2024-39778,0,0,bb2539eb59e56cbeaf6e7ed7999fae0d5792d390eb9e1100733cc6f4b019e4fc,2024-08-19T16:20:52.980000 @@ -257756,8 +257757,8 @@ CVE-2024-42357,0,0,7b039f202cf78cd0431d1a42b63791f2941347495cf765d1f5a63b9327175 CVE-2024-42358,0,0,3235df447217095f8cbf5213ea3a6f300e00850291878619ee95d2566fd638a9,2024-08-12T18:50:20.967000 CVE-2024-4236,0,0,e2cdfe0d631cec0094aabd9e613a58fc530f718522481021cb8970e2da56a2c3,2024-06-04T19:20:32.960000 CVE-2024-42360,0,0,c0e81a640f58f96b9fc0250139f55b49001f14d12c83fe8a549cad0d8c4e02a6,2024-08-16T20:00:10.467000 -CVE-2024-42361,0,1,791f81f0cac385a4379efb7a1aa4fdc62e8bbffd5bcdde4e145909424d9e224e,2024-08-28T13:49:50.457000 -CVE-2024-42362,0,1,25fca8ac5e8ac7bce381e03b27abd95b45c4c358dff550b984cd00a130f5a66b,2024-08-28T13:49:47.967000 +CVE-2024-42361,0,0,791f81f0cac385a4379efb7a1aa4fdc62e8bbffd5bcdde4e145909424d9e224e,2024-08-28T13:49:50.457000 +CVE-2024-42362,0,0,25fca8ac5e8ac7bce381e03b27abd95b45c4c358dff550b984cd00a130f5a66b,2024-08-28T13:49:47.967000 CVE-2024-42363,0,0,845d80b3d90627c09cd2ebcd1015d3397a70bb5dfd2fb99126f84654bc7633e2,2024-08-21T12:30:33.697000 CVE-2024-42364,0,0,4c3af5024e60bada8ffc9756b86fe112164c9d8aeb4b4858c936071d813f7c5c,2024-08-23T16:18:28.547000 CVE-2024-42365,0,0,cd9316acef63aa01c9388716e86faa1c498776bc0209be92960fb577e4f0b965,2024-08-08T18:55:19.180000 @@ -258500,7 +258501,7 @@ CVE-2024-44069,0,0,2eb956dd06d71bb925b0fe816cbe078cd7c5c9a8647e07e8d081256cc543f CVE-2024-44070,0,0,335509dea99ada6c9ff96f06f0e87dab6ba3af229752b80bde023da9415a33b1,2024-08-21T14:35:15.433000 CVE-2024-44073,0,0,ad93c7cd67f110b3f3dbf8094f03e2f128eb131898a84b811a05132b4dd487f2,2024-08-21T12:32:44.470000 CVE-2024-44076,0,0,d8ab474e3e0cd492e411ba495a07543359555360960989541af9d6ad1fd6855e,2024-08-21T12:33:42.487000 -CVE-2024-44083,0,0,87d77446f0404849741728544a896c280716acaeea3d28649c66451adb3a186e,2024-08-21T12:35:54.380000 +CVE-2024-44083,0,1,0fbb97686726ee4d6be299ae185c5a7e6d7807c436d290993d1b41ed0119344c,2024-08-28T15:15:17.050000 CVE-2024-4409,0,0,ef601ae22761768812ec6eb133885b7a6b08c5417903a944100f49b603e1172f,2024-05-24T13:03:11.993000 CVE-2024-4410,0,0,ca43b98286a78ab63b5139b50b93fc074ee9aec4c16e78097aa3514c43622322,2024-07-29T14:12:08.783000 CVE-2024-4411,0,0,9d1b27ccac7555d95c6be5f4488ca4d9772a0570efc26fe6a3f3d131fd0aea06,2024-05-14T16:11:39.510000 @@ -258612,7 +258613,7 @@ CVE-2024-4494,0,0,48359226f338c9b2ea2806c2c68d5e2ef65a24ac708162309f084eae0ceb81 CVE-2024-44940,0,0,f3c78670c961ed218069273846baa8ab159598a99ca4d39386baf88d3ac01c7d,2024-08-26T12:47:20.187000 CVE-2024-44941,0,0,15a1c7001949731e4df03f4a864ae7a9e64adc22c4c644da2de0836d77651385,2024-08-26T12:47:20.187000 CVE-2024-44942,0,0,17b37362bd3ba24b1a5ce481b72105519e3d684fbcb26bdd0327529225c432f3,2024-08-27T16:09:10.010000 -CVE-2024-44943,0,1,5bf597bf2fa044f6eb0ba2afa66eeb4ae405658ddc3b2a597c7fedca3c5f2035,2024-08-28T12:57:17.117000 +CVE-2024-44943,0,0,5bf597bf2fa044f6eb0ba2afa66eeb4ae405658ddc3b2a597c7fedca3c5f2035,2024-08-28T12:57:17.117000 CVE-2024-4495,0,0,cb1d8bc801c43f7ab8180176a646c9e39a56603c1305eac804522af3adac0fa8,2024-05-17T02:40:25.167000 CVE-2024-4496,0,0,6e858d3d5b48b877aff577f900a80fd10c799bd74cdf4188d346fa0d13641a80,2024-06-04T19:20:39.340000 CVE-2024-4497,0,0,6a1d6365c146727895628930cc6e441179a183396cbc0224f0d3e640240772d3,2024-06-04T19:20:39.437000 @@ -258623,10 +258624,10 @@ CVE-2024-4501,0,0,3baebe0a469dd4bf55eae5f370777b6e334d89a3883f98b03d03b220535343 CVE-2024-4502,0,0,f1f89a01c722d6ef2e85e855b85895e43fc279ff3a13e0257efd22aaa2b4c544,2024-06-04T19:20:39.747000 CVE-2024-4503,0,0,580a13ae85da881d7284f0e9b163135d237ab58a854d76134955e6cc28d662e6,2024-06-04T19:20:39.843000 CVE-2024-45036,0,0,b93ba1b942c2a90c7150ffd72c683d09bcb868f6dc285088962d5acc53d2e2e4,2024-08-27T13:01:37.913000 -CVE-2024-45037,0,1,0a75dee24a9a0746d4b594073f73eebe38a0d6b0ee92331f507c53bf54c314fe,2024-08-28T12:57:39.090000 -CVE-2024-45038,0,1,9bc86932f350806c3a4bfe09c65e8bf9ee10a426832d16050cb88cd3f58d1bd8,2024-08-28T12:57:39.090000 +CVE-2024-45037,0,0,0a75dee24a9a0746d4b594073f73eebe38a0d6b0ee92331f507c53bf54c314fe,2024-08-28T12:57:39.090000 +CVE-2024-45038,0,0,9bc86932f350806c3a4bfe09c65e8bf9ee10a426832d16050cb88cd3f58d1bd8,2024-08-28T12:57:39.090000 CVE-2024-4504,0,0,db7504bed7bbf326ed6569d421c20101dbf56fa9ab20eccbe7468f7c026f345b,2024-06-04T19:20:39.947000 -CVE-2024-45049,0,1,2db7654aac013903b19c74b15111e80acc65bf9e641d52dffa75f446b2d1ef2f,2024-08-28T12:57:39.090000 +CVE-2024-45049,0,0,2db7654aac013903b19c74b15111e80acc65bf9e641d52dffa75f446b2d1ef2f,2024-08-28T12:57:39.090000 CVE-2024-4505,0,0,4ef7357f00ff85be3b87c4353ae099f1aed84eaee3f1c1bda33ed5ec6e115293,2024-06-04T19:20:40.050000 CVE-2024-4506,0,0,ddf6bfe33c9fb68b792eae19c37cbcf6030ec7e8a9a0c1f6ead94d2f62170a3f,2024-06-04T19:20:40.150000 CVE-2024-4507,0,0,feffcf27ced8e6be5fca9d21b321343c494624929485135b513ee1c93a346051,2024-06-04T19:20:40.250000 @@ -258685,7 +258686,7 @@ CVE-2024-4532,0,0,4fd2f02f0358f1c611846b77f1b0e80bcb1985e07f23fa6a21a71cc2559350 CVE-2024-45321,0,0,37b6c3801843cd19376dfc008024087eb46b0d9a726e5ad21af320498cf91f40,2024-08-27T14:35:13.357000 CVE-2024-4533,0,0,aca3a412ead1ce1343d6f498450801be5e059db6302d74881039b5fe75fb6c09,2024-05-28T12:39:28.377000 CVE-2024-4534,0,0,527a3127a7586bdf18d80cd2b5b17fe74ac5ed6a2aa4ee562148173cc1d9d3e9,2024-08-09T19:35:09.923000 -CVE-2024-45346,0,1,d96ae0e99a52b4f2d8312b9452d5cf0ddeac889f7ef355700b624cdd0cd1a7c8,2024-08-28T12:57:17.117000 +CVE-2024-45346,0,1,967ca6ed0df27e2a9e907ff7d312e14e26f5a8bce44c8629742d5fb67d6cff89,2024-08-28T14:35:12.640000 CVE-2024-4535,0,0,87b4b5e0787ea182ddd9c6fa8e26c59b6c616e4e57e592ee0d6f169678ff9b64,2024-05-28T12:39:28.377000 CVE-2024-4536,0,0,7a5702ddadcf7f48c7c82ca09978f30e343a6d4f259e12cc6fa88068d1723500,2024-05-07T13:39:32.710000 CVE-2024-4537,0,0,2e530ca2c49a8373646367a8e0c1771a783669d0151f9600cf6b8a99b12e73b9,2024-05-07T13:39:32.710000 @@ -258704,9 +258705,9 @@ CVE-2024-4549,0,0,e09f9cdaebb6118867e13a9d3ab643eb98c9f9e356cd137ad04d5c4afde157 CVE-2024-4551,0,0,5eadeaa2a7f21f0b3297f45277617c137a52e984170b931f9145e745d378c040,2024-06-17T12:42:04.623000 CVE-2024-4552,0,0,a910e848f992d4848b5a9057809234cfe8833a167abb01396097dc34db4ca3d3,2024-06-04T16:57:41.053000 CVE-2024-4553,0,0,a1e8f5bd1acd4a97b93bbbe85c146f94099965137fad1ebd49acd106c4b8e00a,2024-05-21T12:37:59.687000 -CVE-2024-4554,0,1,85c234588dffa6aadefbdd2ba8b5ecdec9422dc38ba14c37503abe443a7c918c,2024-08-28T12:57:17.117000 -CVE-2024-4555,0,1,2d6c47296afeedb2c6a7f60677f2d88681b96e578cfefc1913928dc16b7bb873,2024-08-28T12:57:17.117000 -CVE-2024-4556,0,1,7d09fa247082252ffb6b7dda6aa600cf3ff3bf7dd0d9af7b07da29fff8c7a6fb,2024-08-28T12:57:17.117000 +CVE-2024-4554,0,0,85c234588dffa6aadefbdd2ba8b5ecdec9422dc38ba14c37503abe443a7c918c,2024-08-28T12:57:17.117000 +CVE-2024-4555,0,0,2d6c47296afeedb2c6a7f60677f2d88681b96e578cfefc1913928dc16b7bb873,2024-08-28T12:57:17.117000 +CVE-2024-4556,0,0,7d09fa247082252ffb6b7dda6aa600cf3ff3bf7dd0d9af7b07da29fff8c7a6fb,2024-08-28T12:57:17.117000 CVE-2024-4557,0,0,66c84ceab02c8adff7c7e309e3c388a17800860cf81ce53b59e1c60dda9ffb15,2024-06-28T13:19:24.767000 CVE-2024-4558,0,0,f33120bad100499bf0c3c5e20b119cff8d6ade1c8324fe8cac904ff1ff2e147b,2024-07-30T02:15:08.293000 CVE-2024-4559,0,0,bf46d9d7302afe42ee4323175537eeb1eb701f6d945f2b96b5e6acc4bfa04589,2024-07-03T02:07:46.003000 @@ -259352,7 +259353,7 @@ CVE-2024-5284,0,0,a632d154686ad4201398091156d5b5851cc181b1b36b426c7e50520edad6a7 CVE-2024-5285,0,0,f5fe057b3eff57d7472395b5cf3577db89e74c15c7e806cbb99af18bbf9a648f,2024-08-01T13:59:44.103000 CVE-2024-5286,0,0,e962fadcb8b0d0d0a4155e18c685e9afa8633703c8403a48cdc3bee697298672,2024-08-01T13:59:44.950000 CVE-2024-5287,0,0,13c5ee44df7955897b1f2b3c68a920faa26439fbe1c9c489df67cb947fa427e4,2024-08-01T13:59:45.123000 -CVE-2024-5288,0,1,099c1d3c2643003d52a5f473484a6d38731263e3329a5baa027f91acf149389c,2024-08-28T12:57:39.090000 +CVE-2024-5288,0,0,099c1d3c2643003d52a5f473484a6d38731263e3329a5baa027f91acf149389c,2024-08-28T12:57:39.090000 CVE-2024-5289,0,0,a02da373ddf627c39a88f09ba37230dcf191b29c84a32613f97fcb834cd9c524,2024-06-28T13:13:36.980000 CVE-2024-5290,0,0,adacdfd631af0a2d0e8f586387cac872823eb4764e0466b1013d4b9bdcf14abe,2024-08-07T15:17:46.717000 CVE-2024-5291,0,0,a73212295ca40d57df3fe276c935be7cf4995dc49a26ea7361780508749e211f,2024-05-24T01:15:30.977000 @@ -259578,7 +259579,7 @@ CVE-2024-5542,0,0,d325d927a52d1f509b1ce6e9ffc5100192b188f6993c81c75fa5f58cb6e793 CVE-2024-5543,0,0,f598ca7421d38a6202e8d2e9492da6088279af1ca9b6bc3d3d06b2da06113bc4,2024-06-13T18:36:09.013000 CVE-2024-5544,0,0,dc180b504fcb3a2003d6a08111fbd0a7a95f9d21df8e253c1af1716f464343f6,2024-07-05T14:46:56.023000 CVE-2024-5545,0,0,9270f54f7803e859f3c51cd9a03c613d31e2403f79820ead3f02bc3b56a4bf36,2024-07-05T15:12:08.467000 -CVE-2024-5546,0,1,c554c215c09d3ca801258c193d3de8fa07df6de63bebe1115c8b7786267f050e,2024-08-28T12:57:17.117000 +CVE-2024-5546,0,0,c554c215c09d3ca801258c193d3de8fa07df6de63bebe1115c8b7786267f050e,2024-08-28T12:57:17.117000 CVE-2024-5547,0,0,30803f020db51b7398a94ab478cc6cb1ea70aecfbbe13ac1b895b9f9fa592338,2024-07-12T08:15:11.230000 CVE-2024-5548,0,0,6a07d64078300a9d20971a8757a67f3f4682659414ef6d1de11cb6b5c54c02e2,2024-07-12T08:15:11.313000 CVE-2024-5549,0,0,2db2267d047672e6871a7836da6ae7aa97f316bb2880c93f204c63f2960062f6,2024-07-12T08:15:11.390000 @@ -259791,7 +259792,7 @@ CVE-2024-5810,0,0,246ea4a74a1b10a6c799aa82916b249e6dd3093a23af41d24ba222ed5e8773 CVE-2024-5811,0,0,da48fd72e5de418e87b54290fe68d41aecce53c1cabdd1300feebd9e1c56b865,2024-08-01T14:00:00.527000 CVE-2024-5812,0,0,05caee51ca8afdeadb9e9ce4e5c443d53c88017db3fdf90c8036b6c5139928b3,2024-06-13T18:36:45.417000 CVE-2024-5813,0,0,2236ff95e00a2589bc00dc67452394d14ab32423646c535c5a19397b653232d2,2024-06-13T18:36:45.417000 -CVE-2024-5814,0,1,b53bcc6c4d3dbc5ee42338ab7ba4d2ddb0869c38491163ed26c8c53f4205a07d,2024-08-28T12:57:39.090000 +CVE-2024-5814,0,0,b53bcc6c4d3dbc5ee42338ab7ba4d2ddb0869c38491163ed26c8c53f4205a07d,2024-08-28T12:57:39.090000 CVE-2024-5815,0,0,9c0e5d25f32c2dbefca23815fc2b16e88ce81dd54b9a22e21c721a2b2a9cb1cc,2024-07-17T13:34:20.520000 CVE-2024-5816,0,0,3d67952ce4a1b2b1ece947260f0beee9de9f9da521a3f15a0343c5e1d47b81ea,2024-07-17T13:34:20.520000 CVE-2024-5817,0,0,e05abd62bd06ccb376baea6b1d5f924e4e6fb0941dae50b59d4aa5f4c769fe7a,2024-07-17T13:34:20.520000 @@ -259926,7 +259927,7 @@ CVE-2024-5985,0,0,4b7f0c13c1d049ea5b2816f8e8132ec8aee9a2fb74d5d00bf96c05e553a08b CVE-2024-5988,0,0,6a93e103554a4b2cea7532bb149420b2c5e22d63c1fab23818b5950d94f50a5e,2024-06-25T18:50:42.040000 CVE-2024-5989,0,0,5b8da9d53fdfd0fd3971e8489f4ae4ce0e952b56f28f99337bb24ad669904afb,2024-06-25T18:50:42.040000 CVE-2024-5990,0,0,815ffdec6ed9055e0c29635260b790d8ae8601700cacf3380cde4c3f20ff7240,2024-06-25T18:50:42.040000 -CVE-2024-5991,0,1,e082a26a3412cd6203ddcff1c59506086c1e6d36fa06530b6a36731be74810dd,2024-08-28T12:57:39.090000 +CVE-2024-5991,0,0,e082a26a3412cd6203ddcff1c59506086c1e6d36fa06530b6a36731be74810dd,2024-08-28T12:57:39.090000 CVE-2024-5992,0,0,71d2329832d35306ba58326f8edc972973ae3f2f48367fcc1028f4ed5d9fb912,2024-07-09T18:19:14.047000 CVE-2024-5993,0,0,b45a0ae570b278a2a66647d60174ec8036c753d27cba9d6e9660698bbc3fa2d6,2024-07-09T18:19:14.047000 CVE-2024-5994,0,0,c1974f8e417911883c192155213f25e6e809cb75c20fd828172f5e744b8258d3,2024-06-17T12:42:04.623000 @@ -260186,8 +260187,8 @@ CVE-2024-6307,0,0,a6037df0fa8617c9aaeffdc703000fa7423e885d439338f30eb38eb0279e87 CVE-2024-6308,0,0,12cda7fc9db6b7d83d3e1c89cfc2efc823dbf7a87e765e6ea66a01700b6fc7c7,2024-08-23T16:44:39.510000 CVE-2024-6309,0,0,81d9ed106c3d88c28590c6ed22c5b32147121a952907a1333c0b11de5b47c5b3,2024-07-09T18:19:14.047000 CVE-2024-6310,0,0,c979f814f3e48b96dc9635b552e8c56621ee7c90068be27a9e484f3e9730aa89,2024-07-09T18:19:14.047000 -CVE-2024-6311,0,1,43ed4cd2e3b736026c6c6822a2a9a27bcf942d5fa1856d8c3b333f30284585f6,2024-08-28T12:57:17.117000 -CVE-2024-6312,0,1,8eb85e71d9552d97c872fee9592ac73576ff7ceccb8ebd8b5bc64dc9b965a6f5,2024-08-28T12:57:17.117000 +CVE-2024-6311,0,0,43ed4cd2e3b736026c6c6822a2a9a27bcf942d5fa1856d8c3b333f30284585f6,2024-08-28T12:57:17.117000 +CVE-2024-6312,0,0,8eb85e71d9552d97c872fee9592ac73576ff7ceccb8ebd8b5bc64dc9b965a6f5,2024-08-28T12:57:17.117000 CVE-2024-6313,0,0,3f3a1eb3f6568b25e7e4a0a5a221dc14475a69801be2f42305fb08dd6e12247b,2024-07-09T18:19:14.047000 CVE-2024-6314,0,0,d18fb3c15bbc48d64598d0e894895cc32debae6dd1aff2381c9e4370989d88ec,2024-07-09T18:19:14.047000 CVE-2024-6315,0,0,fab08e85f8b8e3173e728e58aba1b4c74bfe4a8ce767294e3e8e784d2124e746,2024-08-06T16:30:24.547000 @@ -260290,9 +260291,9 @@ CVE-2024-6439,0,0,17c8c0dedf84f798cc0f5ae1eb12bcfee8d03a9530b75eee07a6ecb983f8a0 CVE-2024-6440,0,0,2c5be04f311531a7679fd469afc24458b735968d4c5b698cdcf03804f39d3eef,2024-07-02T17:58:15.410000 CVE-2024-6441,0,0,15383e1684ea64dc1d374e71fe60467b8bfc18bde94b0e73415ebe68688c2118,2024-07-02T17:44:45.700000 CVE-2024-6447,0,0,45fe1e3b45bb9052a54143ac6931092e1b37ff897cd56aa11e3df59780bc06cb,2024-07-11T13:05:54.930000 -CVE-2024-6448,0,1,29c9fba3b86c8e9eb615a2e1f73377ed9eea71e4eb21902a2662b1cd45074970,2024-08-28T12:57:27.610000 -CVE-2024-6449,1,1,409c0fcb928b48e75dd8739da433d4c82c6f5bbdd29a3410dc0ebd549313b1b9,2024-08-28T12:57:17.117000 -CVE-2024-6450,1,1,74d914f08533b12f639ab7397a863aecf56083c839bd046ce7cc7975a6952184,2024-08-28T12:57:17.117000 +CVE-2024-6448,0,0,29c9fba3b86c8e9eb615a2e1f73377ed9eea71e4eb21902a2662b1cd45074970,2024-08-28T12:57:27.610000 +CVE-2024-6449,0,0,409c0fcb928b48e75dd8739da433d4c82c6f5bbdd29a3410dc0ebd549313b1b9,2024-08-28T12:57:17.117000 +CVE-2024-6450,0,0,74d914f08533b12f639ab7397a863aecf56083c839bd046ce7cc7975a6952184,2024-08-28T12:57:17.117000 CVE-2024-6451,0,0,6a9c0fb65fad3a5f99e557f5250ddd026fdc81cb51b281650e16075ca1a8cd9e,2024-08-19T17:35:23.417000 CVE-2024-6452,0,0,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000 CVE-2024-6453,0,0,997e33861988fe67139dbc94cb45099acca0539b377b12d39324c5c718a66e9d,2024-08-21T14:37:10.103000 @@ -260566,7 +260567,7 @@ CVE-2024-6870,0,0,fdc9781daaba3083ba91ed61390ac3ea5e3a3c1deb45aa4706aee786b8d537 CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000 CVE-2024-6873,0,0,8e5db8bfa0491746f29814d1d8249a1850325cbcdbd09b52dbf90709e95d212c,2024-08-01T16:45:25.400000 CVE-2024-6874,0,0,dbf80741a5dbaf69dfea3d6102d0d56a1052d5bac2fe6cc0bc24819c43cddd92,2024-08-01T14:00:45.683000 -CVE-2024-6879,0,0,796e8787c4e64b55f00d5e1372afe875e495c7e65e52369020f8633e04afde03,2024-08-26T12:47:20.187000 +CVE-2024-6879,0,1,6dd99f7574923c6a0220f28a1253b4ac8ff29b09a2650b86b7b021e79b9e4f08,2024-08-28T15:35:24.120000 CVE-2024-6881,0,0,9eb1bb1325feedc0a442bcf6c20b4ef8c1194f18829a36ce47ae950cf638d18d,2024-08-27T11:15:04.740000 CVE-2024-6883,0,0,17af31f8537d0ebfdcc29735e63f85da6d525c783f08d8df80e6d71ccea2f1ba,2024-08-21T12:30:33.697000 CVE-2024-6884,0,0,02f1ddb5da314dd396e2205aa21249cb1d9497ae10f450ff628522b4f22bdeac,2024-08-08T19:35:22.760000 @@ -260815,7 +260816,7 @@ CVE-2024-7264,0,0,12a75b53a7f63996bb7b4af3d1a6b7462e167bb63f5a12a5607f29e5ee6358 CVE-2024-7265,0,0,7744849ec550e14a15ade5689dd13e89a671dd2d7872009d179abef8fe868c92,2024-08-23T15:09:29.843000 CVE-2024-7266,0,0,6254ba9d278e387df53e686fa5a3601176a5b5e90ff24b9b7119a368e812b840,2024-08-23T15:09:51.707000 CVE-2024-7267,0,0,d99f3d8b6ba6fe3542d0e70da6abdfbfdfd1dfb75ac1c1edca9979fafd8e77bc,2024-08-23T15:12:23.453000 -CVE-2024-7269,0,1,b640c119e271cb4b5a6a6cb7e4e0dcae34dab1b0d62b4ab4f61f7960472ac573,2024-08-28T12:57:17.117000 +CVE-2024-7269,0,0,b640c119e271cb4b5a6a6cb7e4e0dcae34dab1b0d62b4ab4f61f7960472ac573,2024-08-28T12:57:17.117000 CVE-2024-7272,0,0,a75598507b088cf5d38e53c97b1d09abbaa1cacf367aa16e740665d3e61a447d,2024-08-13T15:16:23.837000 CVE-2024-7273,0,0,a61ca64a6342f77fae831271fd2a6739b41d99aa7d580eadbf400f237355e05e,2024-08-13T16:10:45.057000 CVE-2024-7274,0,0,42267a3d3600167277031a12316bb396bcb62aa3302bf81726cca9e052e280df,2024-08-13T16:10:42.520000 @@ -260940,7 +260941,7 @@ CVE-2024-7443,0,0,6fd967d6e919ba4fd37dfeb9ebba86f65e44a71c337f483ada629ef6535926 CVE-2024-7444,0,0,ca3d64055e225d6b5e8eee0e0444f0cb79935fb72609b2a9f4d68e4b74c3192c,2024-08-20T19:56:15.850000 CVE-2024-7445,0,0,cfdc75d4fec77cd886589c658aa3dd464f31452c81f68546e40e8c22e50a8eed,2024-08-09T15:36:06.757000 CVE-2024-7446,0,0,e26be21c8dbcfe67dfe123a70d3d827309d2b8d2fde731242ee6ec383c477df8,2024-08-09T15:36:35.453000 -CVE-2024-7447,1,1,6dddf53dfbb8f62511abb82e7501d546503c2e4fba6b3dca7313136123481b92,2024-08-28T12:57:17.117000 +CVE-2024-7447,0,0,6dddf53dfbb8f62511abb82e7501d546503c2e4fba6b3dca7313136123481b92,2024-08-28T12:57:17.117000 CVE-2024-7448,0,0,45c3f7d454a0be35da8c66f5dc9a08909cac5ebb23ff5c9ca2703711c198acbe,2024-08-23T16:54:45.410000 CVE-2024-7449,0,0,31b14531757b0311680dadfa626760cb5034a4ff48ce18c613a332462c638a89,2024-08-20T19:49:11.947000 CVE-2024-7450,0,0,f36a88ecb7cf7b37b6090837acfb29fe52cc382469b7cf045e11a727c85c93f7,2024-08-09T15:33:58.153000 @@ -261030,7 +261031,7 @@ CVE-2024-7567,0,0,8d84928fabcffd92f0ffc65ee27fdbbaa4428b293e351afb4071fd1cdbd8df CVE-2024-7568,0,0,d240e1c33af9e03c75feb4937b0ddf33906a854d9c30167cff3fa79482350e46,2024-08-26T12:47:20.187000 CVE-2024-7569,0,0,07c556a0d4f236c73af8fac785c7f2963a3da01e4fc90b977a8fbdbb98959074,2024-08-14T02:07:05.410000 CVE-2024-7570,0,0,5fffab459f0b197c9cc8f01b0f615f787054152c65ebadc4d4a680afc4fd51fa,2024-08-14T02:07:05.410000 -CVE-2024-7573,0,1,7b157c1bc586485011758f6317cb8548eaad83544501bf2e76c604287d08292a,2024-08-28T12:57:27.610000 +CVE-2024-7573,0,0,7b157c1bc586485011758f6317cb8548eaad83544501bf2e76c604287d08292a,2024-08-28T12:57:27.610000 CVE-2024-7574,0,0,20d9970481b83bc1831e248b5fd88e17f245f697fcf3310f9ca87d287eec943e,2024-08-12T13:41:36.517000 CVE-2024-7578,0,0,6775b71bfb147f33ac75e26864dff0d49501fe87846b04dfe823255ec77604d5,2024-08-07T15:17:46.717000 CVE-2024-7579,0,0,889817c5384ba36003787d6aa90c4889164dbbf7f4fbfe5c6f0287e20d3cf6ed,2024-08-07T15:17:46.717000 @@ -261050,7 +261051,7 @@ CVE-2024-7601,0,0,db9958425836572eda0b52c7e651aff0e41e4dc47ec55ea348bc5752e1b198 CVE-2024-7602,0,0,1295ede0549ca488da522cbefe2db5abad88498e69c53af1f38f0ee81eb69b62,2024-08-23T16:36:11.690000 CVE-2024-7603,0,0,026c301c8508bb2890d37936199245036e5a5160d5195c848eb9252477eef559,2024-08-23T16:36:28.327000 CVE-2024-7604,0,0,2ca377c2d37b9340c6f7d1612379ed11f338df19f0e6ffae40ca1da8c016df51,2024-08-23T16:37:09.107000 -CVE-2024-7608,0,1,b8872988f702757177432eab77e95a14e7cc629ce3c064dd49371a09c8fc5a16,2024-08-28T12:15:06.900000 +CVE-2024-7608,0,0,b8872988f702757177432eab77e95a14e7cc629ce3c064dd49371a09c8fc5a16,2024-08-28T12:15:06.900000 CVE-2024-7610,0,0,a10689bea1d0fbdec4f1b8819e74182773158d5010cb9fbea2ce46532922c645,2024-08-08T13:04:18.753000 CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f263,2024-08-21T18:47:11.523000 CVE-2024-7614,0,0,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000 @@ -261117,7 +261118,7 @@ CVE-2024-7707,0,0,f8de015be00795da0af9b00fe142b56145045c7575c0f341ba96aecb6e80eb CVE-2024-7709,0,0,885c8ab670bc9137207c7147a93dbb83f228a878ced7f9e3351a8e82272eda87,2024-08-17T10:15:10.957000 CVE-2024-7711,0,0,d162b2aa52f460525a4de3c665dffbe11ff5ad157026981df71b9201129fde70,2024-08-21T12:30:33.697000 CVE-2024-7715,0,0,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000 -CVE-2024-7720,0,0,fa989408cdbda8a784c073a3419b0a9bde2bfe617872825f0e9574c0403c663e,2024-08-27T18:33:14.247000 +CVE-2024-7720,0,1,ddf81bc4df03ac1e2d7b5b61581e0a5dc6cc3f46e57542a631155ffde48ea5ad,2024-08-28T14:35:14.160000 CVE-2024-7722,0,0,dd34a6c6fa187cfdff62390c6b38a3b9bbf49b761e6117c420a823ed09401edf,2024-08-21T17:24:59.627000 CVE-2024-7723,0,0,0bdf76bf964a28a97b4d4d8ab086a048836c54fd8be0e41d26426907a661be8a,2024-08-21T17:24:59.627000 CVE-2024-7724,0,0,fd9d5d4a5cde684cb1f23cf1c101e9cac57afdf61c2e095e3e5cfe8dee5c7260,2024-08-21T17:24:59.627000 @@ -261271,7 +261272,7 @@ CVE-2024-8007,0,0,52ca9c0e82e8a1b579386af92379a7290d3dc66a84196be21e42591213ed68 CVE-2024-8011,0,0,b9eccdb873cdee0aa4aaf727a8d55e87a8f1a6dcd35fe88e6cae24de39ee4994,2024-08-26T12:47:20.187000 CVE-2024-8022,0,0,469d074c70ed4d6e1b7ca7023005d3bb3e3f23419b5a39b3540fd69e34fadcaa,2024-08-21T12:30:33.697000 CVE-2024-8023,0,0,7f1c10536d9d4e1a728f09b10c1ff35f77d0bba503a7c61c411fbfd5f6584d46,2024-08-21T12:30:33.697000 -CVE-2024-8030,0,1,b6f55198da4c8a890918e236b9cb91502d6b60f60aed340690526a7aff836eb3,2024-08-28T12:57:27.610000 +CVE-2024-8030,0,0,b6f55198da4c8a890918e236b9cb91502d6b60f60aed340690526a7aff836eb3,2024-08-28T12:57:27.610000 CVE-2024-8033,0,0,bc1d961345030012faa7942ae80f05081f947cf441680ad49c3fcb3512e2fcdc,2024-08-27T19:39:04.953000 CVE-2024-8034,0,0,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a38,2024-08-22T17:35:30.003000 CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000 @@ -261291,7 +261292,7 @@ CVE-2024-8083,0,0,132ff33ed62a0570cfdbcc24775ef89bd874f9ae2d6b782cd1fd9309d1bcaa CVE-2024-8084,0,0,800f6f0fe2093be3327a671bc62389e5ecd680550a19025f92dbb7c739b52793,2024-08-27T16:11:11.460000 CVE-2024-8086,0,0,1db8fbbbc3b8bbc355402aca80f0447c54000b25360ca3b1fa582aada4800dfb,2024-08-27T13:17:34.187000 CVE-2024-8087,0,0,9e47ad2dfed1c8a4045274b6d757cb5a75d1e05917b45ee6f1489b72f67b871b,2024-08-27T13:19:35.530000 -CVE-2024-8088,0,0,59d209ebea916c4dc2d86b3c8215979f6261e01bc484ccba8dba82dfa07cf28c,2024-08-26T19:15:08.433000 +CVE-2024-8088,0,1,eefe1a1372d9b46aa5e566c2ef27254fde97726a0efc2a70dcee8d1d993663e7,2024-08-28T14:15:08.813000 CVE-2024-8089,0,0,e6e12db9d845890df3284b8f9ed104fa7a1183d91532c3c72d090f8235aedb4e,2024-08-27T13:21:22.927000 CVE-2024-8105,0,0,752bedc9f1c31babb6206d0feb37f4463554ca0baee90f1af7f94ac05e52579f,2024-08-27T13:02:05.683000 CVE-2024-8112,0,0,53bc9e4fb84bb028363b46c3cb18428063770b5e5c085f93ec85e24d18222c0b,2024-08-23T16:18:28.547000 @@ -261341,30 +261342,31 @@ CVE-2024-8174,0,0,8543f0d8f92ea7727c4605df4b165224a3b6d137f11ee710b81d48c311ac7b CVE-2024-8181,0,0,30918501aab4364009bd3804956f0f10b449aad4949fccf3aacccef25d5db4b2,2024-08-27T15:52:01.317000 CVE-2024-8182,0,0,d21b4ee027b5d7ffbba2e6af93024450552ec0bbbe1dfa5ea2b2ec2db0e50d89,2024-08-27T15:52:01.317000 CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000 +CVE-2024-8195,1,1,690850dad9e9debe83e3b31934e05f3d048da18a5a72ab008b4259527f1aad61,2024-08-28T14:31:24.487000 CVE-2024-8197,0,0,60c1dd5a1a3c5aad3ac938fab8c46d1fa7e711c4df3249376b3e24407eb9fe54,2024-08-27T13:01:37.913000 CVE-2024-8199,0,0,e4e155faf7982af494f6088e1ddff038dcc1d62a5700003ee5b4a40cfdce83b8,2024-08-27T18:33:14.247000 CVE-2024-8200,0,0,d43bb5c61e83498550affa212dfef3001c48e0b48cb46337b88a2d4649830cd9,2024-08-27T18:33:14.247000 CVE-2024-8207,0,0,498323e8227fa40c3fd29b85835950264192b60730f689cfc748d515dfd6f7ad,2024-08-27T13:01:37.913000 CVE-2024-8208,0,0,c0546cf56f335de149e039eaf41ddcfe92498da6cf6c84b8fa1c52ddaf26fb1f,2024-08-27T18:33:14.247000 CVE-2024-8209,0,0,55f7ec189eb87638165e40939313326ea0521e4ed80e56afdb88c580a7b1c999,2024-08-27T18:33:14.247000 -CVE-2024-8210,0,1,0f20faea29960531878b9d44b5de81c4bb8a136a66158d050d0fa865804f0894,2024-08-28T12:57:39.090000 -CVE-2024-8211,0,1,fbbbd446184367b256f503f7804d41b1c530b86aa2566de0bfd744ef8511b597,2024-08-28T12:57:39.090000 -CVE-2024-8212,0,1,0495e818b2a8ffb3c8d9bfdc3c2659f50e7f2df7f2d438a46de57d9fb0868aa0,2024-08-28T12:57:39.090000 -CVE-2024-8213,0,1,124c271d4a9bfa266640967701eae7005c193e0bf7c26fe10ed980e82caf7396,2024-08-28T12:57:39.090000 -CVE-2024-8214,0,1,0e71514d1196df73659483cfece536cdc9a857169c79a9d67bb3c00b7612c9ef,2024-08-28T12:57:39.090000 -CVE-2024-8216,0,1,cb8d40f1436fd080c23eac460f15b674ed31f0ca2443501d4312cfd722c5239b,2024-08-28T12:57:39.090000 -CVE-2024-8217,0,1,4988ac117fe94e84368bc0e3a617d8f1f584c5cedecf248951a42378cfe7419c,2024-08-28T12:57:39.090000 -CVE-2024-8218,0,1,42f4d3535de6c450374afc39831562b8ce54446cfa93a0e43661a89084ae32b5,2024-08-28T12:57:39.090000 -CVE-2024-8219,0,1,020217c5f2d4383e3e6ac15530b38b75eed50aa2ee6b802fcdbebeda98fe0244,2024-08-28T12:57:39.090000 -CVE-2024-8220,0,1,79815378c415ba150d03dc0ebe37ccd2a486636c23004eb5186e3fb1795d368e,2024-08-28T12:57:39.090000 -CVE-2024-8221,0,1,578463535413c16483b54d916ab80fbf1eb0a10264710445cc934689a1d54c38,2024-08-28T12:57:27.610000 -CVE-2024-8222,0,1,14448de6e80fe93264d9439a41f3f54e2047d8e17a0c089fe04e8f0d015539f8,2024-08-28T12:57:27.610000 -CVE-2024-8223,0,1,5777afdaace31dd8b930d8f2b9e90c448d52c58232b2719e7e710ac00f1783a0,2024-08-28T12:57:27.610000 -CVE-2024-8224,0,1,451d9d18d3a1ba287940e19b9460b106889ad43147ac3b71630894a949173248,2024-08-28T12:57:27.610000 -CVE-2024-8225,0,1,d6e1ce99a6072be0a29dcbfff4a3742d05ba5ab213239c917bbdadd477061396,2024-08-28T12:57:27.610000 -CVE-2024-8226,0,1,8c49cc0a485bfe5493056f2e275744004fa15a6a95412c69c80b3b1ea3ab1cf3,2024-08-28T12:57:27.610000 -CVE-2024-8227,0,1,d97da83fce481b16cc43de005839ed9fd237d781dd1d9b7d00c429ed02944807,2024-08-28T12:57:27.610000 -CVE-2024-8228,0,1,f6f2f604b2994b6358da5c57cbd126dd599c69f492b0a42e2dcce4ce9660aad8,2024-08-28T12:57:27.610000 -CVE-2024-8229,0,1,90c164becae9336c40f70b392760fa51d5bec7feebb0ba5857169c6fbfa3c00b,2024-08-28T12:57:27.610000 -CVE-2024-8230,0,1,c17f4a35f0c9cecdbf9fd03893914aaf348c2dd62cc57f400e5ed276c8c58298,2024-08-28T12:57:27.610000 -CVE-2024-8231,0,1,19b769716e3fff898a72bf0ee7d68779b61ab99af63bed31a0498759613ebd4e,2024-08-28T12:57:27.610000 +CVE-2024-8210,0,0,0f20faea29960531878b9d44b5de81c4bb8a136a66158d050d0fa865804f0894,2024-08-28T12:57:39.090000 +CVE-2024-8211,0,0,fbbbd446184367b256f503f7804d41b1c530b86aa2566de0bfd744ef8511b597,2024-08-28T12:57:39.090000 +CVE-2024-8212,0,0,0495e818b2a8ffb3c8d9bfdc3c2659f50e7f2df7f2d438a46de57d9fb0868aa0,2024-08-28T12:57:39.090000 +CVE-2024-8213,0,0,124c271d4a9bfa266640967701eae7005c193e0bf7c26fe10ed980e82caf7396,2024-08-28T12:57:39.090000 +CVE-2024-8214,0,0,0e71514d1196df73659483cfece536cdc9a857169c79a9d67bb3c00b7612c9ef,2024-08-28T12:57:39.090000 +CVE-2024-8216,0,0,cb8d40f1436fd080c23eac460f15b674ed31f0ca2443501d4312cfd722c5239b,2024-08-28T12:57:39.090000 +CVE-2024-8217,0,0,4988ac117fe94e84368bc0e3a617d8f1f584c5cedecf248951a42378cfe7419c,2024-08-28T12:57:39.090000 +CVE-2024-8218,0,0,42f4d3535de6c450374afc39831562b8ce54446cfa93a0e43661a89084ae32b5,2024-08-28T12:57:39.090000 +CVE-2024-8219,0,0,020217c5f2d4383e3e6ac15530b38b75eed50aa2ee6b802fcdbebeda98fe0244,2024-08-28T12:57:39.090000 +CVE-2024-8220,0,0,79815378c415ba150d03dc0ebe37ccd2a486636c23004eb5186e3fb1795d368e,2024-08-28T12:57:39.090000 +CVE-2024-8221,0,0,578463535413c16483b54d916ab80fbf1eb0a10264710445cc934689a1d54c38,2024-08-28T12:57:27.610000 +CVE-2024-8222,0,0,14448de6e80fe93264d9439a41f3f54e2047d8e17a0c089fe04e8f0d015539f8,2024-08-28T12:57:27.610000 +CVE-2024-8223,0,0,5777afdaace31dd8b930d8f2b9e90c448d52c58232b2719e7e710ac00f1783a0,2024-08-28T12:57:27.610000 +CVE-2024-8224,0,0,451d9d18d3a1ba287940e19b9460b106889ad43147ac3b71630894a949173248,2024-08-28T12:57:27.610000 +CVE-2024-8225,0,0,d6e1ce99a6072be0a29dcbfff4a3742d05ba5ab213239c917bbdadd477061396,2024-08-28T12:57:27.610000 +CVE-2024-8226,0,0,8c49cc0a485bfe5493056f2e275744004fa15a6a95412c69c80b3b1ea3ab1cf3,2024-08-28T12:57:27.610000 +CVE-2024-8227,0,0,d97da83fce481b16cc43de005839ed9fd237d781dd1d9b7d00c429ed02944807,2024-08-28T12:57:27.610000 +CVE-2024-8228,0,0,f6f2f604b2994b6358da5c57cbd126dd599c69f492b0a42e2dcce4ce9660aad8,2024-08-28T12:57:27.610000 +CVE-2024-8229,0,0,90c164becae9336c40f70b392760fa51d5bec7feebb0ba5857169c6fbfa3c00b,2024-08-28T12:57:27.610000 +CVE-2024-8230,0,0,c17f4a35f0c9cecdbf9fd03893914aaf348c2dd62cc57f400e5ed276c8c58298,2024-08-28T12:57:27.610000 +CVE-2024-8231,0,0,19b769716e3fff898a72bf0ee7d68779b61ab99af63bed31a0498759613ebd4e,2024-08-28T12:57:27.610000